Search results

1 – 10 of 25
Open Access
Article
Publication date: 6 February 2024

Abdelmoneim Bahyeldin Mohamed Metwally and Ahmed Diab

In developing countries, how risk management technologies influence management accounting and control (MAC) practices is under-researched. By drawing on insights from…

Abstract

Purpose

In developing countries, how risk management technologies influence management accounting and control (MAC) practices is under-researched. By drawing on insights from institutional studies, this study aims to examine the multiple institutional pressures surrounding an entity and influencing its risk-based management control (RBC) system – that is, how RBC appears in an emerging market attributed to institutional multiplicity.

Design/methodology/approach

The authors used qualitative case study research methods to collect empirical evidence from a privately owned Egyptian insurance company.

Findings

The authors observed that in the transformation to risk-based controls, especially in socio-political settings such as Egypt, changes in MAC systems were consistent with the shifts in the institutional context. Along with changes in the institutional environment, the case company sought to configure its MAC system to be more risk-based to achieve its strategic goals effectively and maintain its sustainability.

Originality/value

This research provides a fuller view of risk-based management controls based on the social, professional and political perspectives central to the examined institutional environment. Moreover, unlike early studies that reported resistance to RBC, this case reveals the institutional dynamics contributing to the successful implementation of RBC in an emerging market.

Details

Qualitative Research in Accounting & Management, vol. 21 no. 2
Type: Research Article
ISSN: 1176-6093

Keywords

Open Access
Article
Publication date: 24 December 2020

Christian Hugo Hoffmann

Following the call for strengthening the third pillar of knowledge in entrepreneurship as well as work-applied management contexts constituted by pragmatic design principles, we…

3179

Abstract

Purpose

Following the call for strengthening the third pillar of knowledge in entrepreneurship as well as work-applied management contexts constituted by pragmatic design principles, we present a case study on an insurtech for insurance firms specialized in smart contract insurance solutions such as flight delay or ski resort insurance.

Design/methodology/approach

Design science.

Findings

This not only serves as a pointer for how insurances may master their digital transformation while remaining competitive. But moreover, on the meta level, we find that the adoption of entrepreneurial design principles by the students, whose experiential project represents our case study, does not necessarily require continuous support or foundational knowledge to be delivered beforehand. However, for a deeper or more holistic assessment of the case sketched in their project, it makes sense to introduce them to newer developments such as the simple, practical framework of the Entrepreneur's Question Index.

Originality/value

Innovative teaching method on innovative topics.

Details

Journal of Work-Applied Management, vol. 13 no. 1
Type: Research Article
ISSN: 2205-2062

Keywords

Open Access
Article
Publication date: 9 November 2021

Zareef Mohammed

Data breaches are an increasing phenomenon in today's digital society. Despite the preparations an organization must take to prevent a data breach, it is still necessary to…

3794

Abstract

Purpose

Data breaches are an increasing phenomenon in today's digital society. Despite the preparations an organization must take to prevent a data breach, it is still necessary to develop strategies in the event of a data breach. This paper explores the key recovery areas necessary for data breach recovery.

Design/methodology/approach

Stakeholder theory and three recovery areas (customer, employee and process recovery) are proposed as necessary theoretical lens to study data breach recovery. Three data breach cases (Anthem, Equifax, and Citrix) were presented to provide merit to the argument of the proposed theoretical foundations of stakeholder theory and recovery areas for data breach recovery research.

Findings

Insights from these cases reveal four areas of recovery are necessary for data breach recovery – customer recovery, employee recovery, process recovery and regulatory recovery.

Originality/value

These areas are presented in the data recovery areas model and are necessary for: (1) organizations to focus on these areas when resolving data breaches and (2) future data breach recovery researchers in developing their research in the field.

Details

Organizational Cybersecurity Journal: Practice, Process and People, vol. 2 no. 1
Type: Research Article
ISSN: 2635-0270

Keywords

Open Access
Article
Publication date: 3 September 2019

Claudio Miraldo, Sonia Francisca Monken, Lara Motta and Ana Freitas Ribeiro

To promote access to their services, health-care companies provide various communication channels to their customers (beneficiaries) to enable the receipt of requests, such as…

3812

Abstract

Purpose

To promote access to their services, health-care companies provide various communication channels to their customers (beneficiaries) to enable the receipt of requests, such as authorization for examinations, procedures and hospitalizations. Under the approach of innovation studies, the management of customer relationship channels for health-care companies is characterized as a knowledge-intensive business service (KIBS). The purpose of this study is presenting innovation as a strategy to increase customer service productivity, as well as the monitoring of the quality of the service, the generation of health information for beneficiaries and compliance with the regulation set by the Brazilian National Health Agency (ANS).

Design/methodology/approach

The study is characterized as an applied research, as it proposes solutions to problems faced by supplemental health-care companies using the strategy of action research, i.e. an independent, social research with an empirical basis.

Findings

The result of this study shows that a computerized health-care system can increase productivity by 21.96%, and it presents an innovative solution for health-care companies to guarantee the process of meeting the demands and requests of their beneficiaries, ensuring the compliance with ANS regulations.

Practical implications

These results can be replicated to other healthcare companies and contribute to those seeking innovation, increased productivity and quality improvements in their services.

Originality/value

This work was also motivated by the lack of lstudies in the areas of health-care companies in Brazil.

Details

Innovation & Management Review, vol. 16 no. 4
Type: Research Article
ISSN: 2515-8961

Keywords

Open Access
Article
Publication date: 23 December 2022

W. Alec Cram and Rissaile Mouajou-Kenfack

The growing frequency of cybersecurity incidents commonly requires organizations to notify customers of ongoing events. However, the content contained within these notifications…

Abstract

Purpose

The growing frequency of cybersecurity incidents commonly requires organizations to notify customers of ongoing events. However, the content contained within these notifications varies widely, including differences in the level of detail, apportioning of blame, compensation and corrective action. This study seeks to identify patterns contained within cybersecurity incident notifications by constructing a typology of organizational responses.

Design/methodology/approach

Based on a detailed review of 1,073 global cybersecurity incidents occurring during 2020, the authors obtained and qualitatively analyzed 451 customer notifications.

Findings

The results reveal three distinct organizational response types associated with the level of detail contained within the notification (full transparency, guarded and opacity), as well as three response types associated with the benefitting party (customer interest, balanced interest and company interest).

Originality/value

This work extends past classifications of cybersecurity incident notifications and provides a template of possible notification approaches that could be adopted by organizations.

Details

Organizational Cybersecurity Journal: Practice, Process and People, vol. 3 no. 1
Type: Research Article
ISSN: 2635-0270

Keywords

Open Access
Article
Publication date: 11 May 2020

Marcelo José Carrer, Rodrigo Lanna Franco da Silveira, Marcela de Mello Brandão Vinholis and Hildo Meirelles De Souza Filho

The purpose of this study is to investigate the determinants of agricultural insurance adoption by farmers of the state of São Paulo, Brazil.

2267

Abstract

Purpose

The purpose of this study is to investigate the determinants of agricultural insurance adoption by farmers of the state of São Paulo, Brazil.

Design/methodology/approach

Primary data from the 2015/2016 crop season was collected from a sample of 175 farmers. Logit econometric models were applied to identify the variables that affect the probability of agricultural insurance adoption.

Findings

The empirical results show that the education level, access to technical assistance, use of management tools and farm size positively affect the probability of adopting agricultural insurance. In addition, farmers who produce soybean and/or corn are more likely to use insurance. On the other hand, the higher the farmers’ propensity to take risk the lower the likelihood of using insurance.

Research limitations/implications

The empirical analysis is based on cross-sectional data of a sample of 175 farmers of the state of São Paulo. The use of panel data with a larger sample of farmers, considering a period of years, could provide additional information.

Originality/value

To the best of the knowledge, this is the first empirical analysis about determinants of agricultural insurance adoption by Brazilian farmers, considering behavioral factors. The findings provide useful insights for policymakers in formulating risk management programs in the Brazilian agricultural markets. A better understanding about the determinants of insurance adoption is also relevant for private companies that sell insurance to farmers. Therefore, the paper may contribute with the diffusion of rural insurance as risk management tool in Brazilian agriculture.

Details

RAUSP Management Journal, vol. 55 no. 4
Type: Research Article
ISSN: 2531-0488

Keywords

Open Access
Article
Publication date: 6 November 2017

Noel Murray, Ajay K. Manrai and Lalita Ajay Manrai

This paper aims to present an analysis of the role of financial incentives, moral hazard and conflicts of interests leading up to the 2008 financial crisis.

6305

Abstract

Purpose

This paper aims to present an analysis of the role of financial incentives, moral hazard and conflicts of interests leading up to the 2008 financial crisis.

Design/methodology/approach

The study’s analysis has identified common structural flaws throughout the securitization food chain. These structural flaws include inappropriate incentives, the absence of punishment, moral hazard and conflicts of interest. This research sees the full impact of these structural flaws when considering their co-occurrence throughout the financial system. The authors address systemic defects in the securitization food chain and examine the inter-relationships among homeowners, mortgage originators, investment banks and investors. The authors also address the role of exogenous factors, including the SEC, AIG, the credit rating agencies, Congress, business academia and the business media.

Findings

The study argues that the lack of criminal prosecutions of key financial executives has been a key factor in creating moral hazard. Eight years after the Great Recession ended in the USA, the financial services industry continues to suffer from a crisis of trust with society.

Practical implications

An overwhelming majority of Americans, 89 per cent, believe that the federal government does a poor job of regulating the financial services industry (Puzzanghera, 2014). A study argues that the current corporate lobbying framework undermines societal expectations of political equality and consent (Alzola, 2013). The authors believe the Singapore model may be a useful starting point to restructure regulatory agencies so that they are more responsive to societal concerns and less responsive to special interests. Finally, the widespread perception is that the financial services sector, in particular, is ethically challenged (Ferguson, 2012); perhaps there would be some benefit from the implementation of ethical climate monitoring in firms that have been subject to deferred prosecution agreements for serious ethical violations (Arnaud, 2010).

Originality/value

The authors believe the paper makes a truly original contribution. They provide new insights via their analysis of the role of financial incentives, moral hazard and conflicts of interests leading up to the 2008 financial crisis.

Details

Journal of Economics, Finance and Administrative Science, vol. 22 no. 43
Type: Research Article
ISSN: 2077-1886

Keywords

Open Access
Article
Publication date: 1 October 2019

Kay Rogage, Adrian Clear, Zaid Alwan, Tom Lawrence and Graham Kelly

Buildings and their use is a complex process from design to occupation. Buildings produce huge volumes of data such as building information modelling (BIM), sensor (e.g. from…

4396

Abstract

Purpose

Buildings and their use is a complex process from design to occupation. Buildings produce huge volumes of data such as building information modelling (BIM), sensor (e.g. from building management systems), occupant and building maintenance data. These data can be spread across multiple disconnected systems in numerous formats, making their combined analysis difficult. The purpose of this paper is to bring these sources of data together, to provide a more complete account of a building and, consequently, a more comprehensive basis for understanding and managing its performance.

Design/methodology/approach

Building data from a sample of newly constructed housing units were analysed, several properties were identified for the study and sensors deployed. A sensor agnostic platform for visualising real-time building performance data was developed.

Findings

Data sources from both sensor data and qualitative questionnaire were analysed and a matrix of elements affecting building performance in areas such as energy use, comfort use, integration with technology was presented. In addition, a prototype sensor visualisation platform was designed to connect in-use performance data to BIM.

Originality/value

This work presents initial findings from a post occupancy evaluation utilising sensor data. The work attempts to address the issues of BIM in-use scenarios for housing sector. A prototype was developed which can be fully developed and replicated to wider housing projects. The findings can better address how indoor thermal comfort parameters can be used to improve housing stock and even address elements such as machine learning for better buildings.

Details

International Journal of Building Pathology and Adaptation, vol. 38 no. 1
Type: Research Article
ISSN: 2398-4708

Keywords

Open Access
Article
Publication date: 4 December 2017

Soonduck Yoo

In Korea and abroad, this paper investigates the use of blockchains in the financial sector. This study aims to examine how blockchains are applied to the financial sector and how…

24433

Abstract

Purpose

In Korea and abroad, this paper investigates the use of blockchains in the financial sector. This study aims to examine how blockchains are applied to the financial sector and how to respond to the Korean conditions.

Design/methodology/approach

This paper investigates the movements of the financial sector and related services using the blockchain in the current market.

Findings

First, as a result of examining domestic and foreign cases, it can be seen that the areas where blockchains are most actively applied in the financial sector are expanding into settlement, remittance, securities and smart contracts. Also, in Korea, many of the authentication procedures based on the equipment possessed by the consumers are used so that introduction of the blockchain in the authentication part is prominent. Second, the move to introduce a closed (private) distributed ledger that does not go through the central bank is accelerating in payments between banks. Third, domestic financial institutions also need joint action by financial institutions through a blockchain consortium to apply blockchain technology to the financial sector. Fourth, consumer needs and technological developments are changing. At the same time, as the opportunity to infringe on the information held by individuals has expanded, the need for blockchain technology is strongly emerging because of the efforts of the organizations to defend it.

Originality/value

This paper contributes to understanding the changes in the financial sector using the blockchain.

Details

Asia Pacific Journal of Innovation and Entrepreneurship, vol. 11 no. 3
Type: Research Article
ISSN: 2071-1395

Keywords

Open Access
Article
Publication date: 11 September 2017

Michel van Eeten

The issue of cybersecurity has been cast as the focal point of a fight between two conflicting governance models: the nation-state model of national security and the global…

5195

Abstract

Purpose

The issue of cybersecurity has been cast as the focal point of a fight between two conflicting governance models: the nation-state model of national security and the global governance model of multi-stakeholder collaboration, as seen in forums like IGF, IETF, ICANN, etc. There is a strange disconnect, however, between this supposed fight and the actual control over cybersecurity “on the ground”. This paper aims to reconnect discourse and control via a property rights approach, where control is located first and foremost in ownership.

Design/methodology/approach

This paper first conceptualizes current governance mechanisms through ownership and property rights. These concepts locate control over internet resources. They also help us understand ongoing shifts in control. Such shifts in governance are actually happening, security governance is being patched left and right, but these arrangements bear little resemblance to either the national security model of states or the global model of multi-stakeholder collaboration. With the conceptualization in hand, the paper then presents case studies of governance that have emerged around specific security externalities.

Findings

While not all mechanisms are equally effective, in each of the studied areas, the author found evidence of private actors partially internalizing the externalities, mostly on a voluntary basis and through network governance mechanisms. No one thinks that this is enough, but it is a starting point. Future research is needed to identify how these mechanisms can be extended or supplemented to further improve the governance of cybersecurity.

Originality/value

This paper bridges together the disconnected research communities on governance and (technical) cybersecurity.

Details

Digital Policy, Regulation and Governance, vol. 19 no. 6
Type: Research Article
ISSN: 2398-5038

Keywords

1 – 10 of 25