Search results

1 – 7 of 7
Article
Publication date: 9 April 2024

Nichapa Phraknoi, Mark Stevenson and Meng Jia

The purpose of this study is to define and investigate the governance requirements of supply chain finance (SCF).

Abstract

Purpose

The purpose of this study is to define and investigate the governance requirements of supply chain finance (SCF).

Design/methodology/approach

A qualitative analysis of 849 news articles published in UK newspapers (2000–2022) using the Gioia method.

Findings

SCF governance relies on developing capacities for reflexive scrutiny at two stages: (1) prior to entering into an SCF relationship and (2) during its operation. Based on the notion of SCF as a complex adaptive system, we theorise SCF governance requirements as a dual-layered semipermeable boundary. The semipermeability of the two layers allows for a dynamic exchange between the SCF system and its environment. The first layer is the capacity to selectively enable or control the entry and access of certain actors and practices into the SCF system. The second layer is a capacity for ongoing scrutiny of the SCF operation and its development. Further, we identify five aspects of governance to be enabled, i.e. enhancing adaptability, building confidence, improving efficiency, advancing technology and promoting transparency; and four aspects to be controlled, i.e. preventing abuse of power, curbing fraud risk, constraining operational risk and restricting risky extensions to SCF practices.

Practical implications

Our dynamic framework can guide supply chain (SC) members in making decisions about whether to participate, or continue to operate, in an SCF relationship. Moreover, the findings have implications for policymakers and authorities who oversee entry/access and the involvement of SCF providers, particularly, fintech firms.

Originality/value

The study contributes to both the SC and governance literature by providing a systematic analysis of what SCF governance has to accomplish. Our novel contribution lies in its analysis of SCF governance based on a complex adaptive system approach, which expands the existing literature where SCF is described in rather static terms. More specifically, it suggests a need for a dynamic duality of SCF governance through the semipermeable boundary that selectively enables and controls certain SCF actors and practices.

Details

International Journal of Physical Distribution & Logistics Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0960-0035

Keywords

Article
Publication date: 30 April 2024

C. Bharanidharan, S. Malathi and Hariprasath Manoharan

The potential of vehicle ad hoc networks (VANETs) to improve driver and passenger safety and security has made them a hot topic in the field of intelligent transportation systems…

Abstract

Purpose

The potential of vehicle ad hoc networks (VANETs) to improve driver and passenger safety and security has made them a hot topic in the field of intelligent transportation systems (ITSs). VANETs have different characteristics and system architectures from mobile ad hoc networks (MANETs), with a primary focus on vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communication. But protecting VANETs from malicious assaults is crucial because they can undermine network security and safety.

Design/methodology/approach

The black hole attack is a well-known danger to VANETs. It occurs when a hostile node introduces phony routing tables into the network, potentially damaging it and interfering with communication. A safe ad hoc on-demand distance vector (AODV) routing protocol has been created in response to this issue. By adding cryptographic features for source and target node verification to the route request (RREQ) and route reply (RREP) packets, this protocol improves upon the original AODV routing system.

Findings

Through the use of cryptographic-based encryption and decryption techniques, the suggested method fortifies the VANET connection. In addition, other network metrics are taken into account to assess the effectiveness of the secure AODV routing protocol under black hole attacks, including packet loss, end-to-end latency, packet delivery ratio (PDR) and routing request overhead. Results from simulations using an NS-2.33 simulator show how well the suggested fix works to enhance system performance and lessen the effects of black hole assaults on VANETs.

Originality/value

All things considered, the safe AODV routing protocol provides a strong method for improving security and dependability in VANET systems, protecting against malevolent attacks and guaranteeing smooth communication between cars and infrastructure.

Details

International Journal of Intelligent Unmanned Systems, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2049-6427

Keywords

Article
Publication date: 29 April 2024

Laura Khalil and Joao Da Silva Guerreiro

The purpose of this paper is to examine the current state of the literature on the variables associated with self-harm and aggression in women who committed a criminal offence.

Abstract

Purpose

The purpose of this paper is to examine the current state of the literature on the variables associated with self-harm and aggression in women who committed a criminal offence.

Design/methodology/approach

Studies were identified through online databases, namely, PsycINFO, PubMed, ERIC and EBSCOhost, as well as manual searches of reference lists of the selected studies. The target population included women who committed a criminal offence and have engaged in self-harm and aggressive behaviors during their incarceration, either in correctional institutions or in forensic psychiatric settings.

Findings

Of the 1,178 studies identified, nine met inclusion criteria. The studies were conducted in six different countries and included data from 6360 female participants. Few studies examine self-harm and aggression in women who committed a criminal offence which speaks to the still sparse literature on this topic. This review of the association between self-harm and aggression in women offenders highlights the finding that a small group of women is often involved in both self-harm and aggression. The authors have identified possible psychological factors associated with women engaging in both self-harm and aggression. The findings also reveal a possible connection between types of aggressive behaviors and specific time periods during sentences or stays in forensic psychiatry.

Practical implications

The findings of this scoping review have clinical implications which may be considered by both researchers and the case management teams of women involved in both self-harm and aggression.

Originality/value

Despite the limited number of studies examining self-harm and aggression in women, this scoping review highlights gaps in the literature as well as notable psychological correlates of women who engage in self-harm and aggression.

Details

The Journal of Forensic Practice, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2050-8794

Keywords

Open Access
Article
Publication date: 7 May 2024

Yazeed A. Alragabah and Mohd. Ahmed

There is a limited number of research work on critical success factors (CSFs) in public construction projects in Saudi Arabia. In response to this knowledge gap, the objective of…

Abstract

Purpose

There is a limited number of research work on critical success factors (CSFs) in public construction projects in Saudi Arabia. In response to this knowledge gap, the objective of this paper is to assess the impact of CSFs on the government construction projects in Saudi Arabia. The success factors are investigated from a broader consideration of failure criteria, from consideration of most effectiveness in successful project completion and also from consideration of the impact of implementing control processes for successful project completion.

Design/methodology/approach

This study has analysed the impact of success factors on construction projects in Saudi Arabia using a descriptive methodology. An exhaustive literature survey is undertaken to identify the success and failure factors related to government construction projects in Saudi Arabia. The survey data are sorted out and analysed by cost, schedule, technical, context and finance dimensions of the projects based on project types, engineering complexity, size, modality, jurisdictional control and funding approach. To evaluate the influence of success factors implementation, qualitative data were collected in a survey via a web-based questionnaire that was sent to officials working and occupying a responsible position in national project guidelines organizations and in government construction organizations in Saudi Arabia. In all, 28 CSFs were identified, ranked and evaluated for their impact on project success. The four identified factors belong to process categories of construction projects, nine factors belong to management of construction projects and 15 success factors are identified for impact assessment of implementation in construction projects.

Findings

The study's findings have identified and ranked the top five CSFs that significantly influence project outcomes, including meeting time targets, adhering to financial budgets, delivering desired outcomes for all stakeholders, effectively managing risks and assembling the appropriate team while optimizing resource allocation. Additionally, the research indicates that hindrances to projects primarily stem from execution, economic, human and political factors. The study advocates for strict controls over incomplete engineering designs and advises against contractors independently handling design work to ensure project success. Additionally, addressing contractors' qualifications and financial matters is crucial for project success. By highlighting these CSFs and challenges, the research provides actionable insights to enhance project management practices in the construction industry.

Research limitations/implications

This study is limited to the infrastructure projects constructed by governmental bodies with the participation of officials from government organizations. Further study, including private projects and officials working on private projects, may be needed to generalized the research outcome.

Originality/value

Numerous studies have investigated CSFs in construction projects, but few have examined their relevance to Saudi Arabian government projects. This study aims to fill this gap by identifying key CSFs specific to Saudi Arabian public sector construction projects and assessing their impact on project success. It advocates for stringent controls in the Saudi Arabian construction sector, emphasizing the importance of preventing incomplete or altered engineering designs by contractors to increase the success rate of public sector projects. This research offers practical insights to stakeholders, advancing project management practices in Saudi Arabia's construction sector for improved outcomes and resource utilization.

Details

Frontiers in Engineering and Built Environment, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2634-2499

Keywords

Article
Publication date: 9 April 2024

Rita Peihua Zhang, Helen Lingard, Jack Clarke, Stefan Greuter, Lyndall Strazdins, Christine LaBond and Tinh Doan

This paper describes the development of a digital role play game (RPG) designed to help construction apprentices to better communicate with their supervisors about issues with the…

Abstract

Purpose

This paper describes the development of a digital role play game (RPG) designed to help construction apprentices to better communicate with their supervisors about issues with the potential to impact on their physical and psychological health and safety.

Design/methodology/approach

A participatory approach was adopted to utilise the knowledge and insights of the target users to inform the digital RPG development. Apprentices and supervisors were interviewed to identify characteristics of effective supervisor-apprentice communication, which became the RPG’s learning objectives. The scenarios constructed in the RPG were drawn from lived experiences shared by the apprentices in the interviews. During the development process, consultations were conducted with an advisory committee comprising of apprentices and supervisors to improve the realism of the RPG scenarios.

Findings

Three scenarios were developed for the RPG. In each scenario, players are asked to make decisions at various interaction points about how the characters should respond to the unfolding and challenging situations. Scripts were developed for the game, which were acted out and motion captured to animate digital MetaHuman characters embedded in a virtual construction site. Two example situations are introduced in this paper to illustrate the development process.

Originality/value

To our knowledge, the RPG introduced is one of the first applications of digital game-based training in the construction industry. The adoption of a participatory design approach ensures that the game content relates to real-world experiences. The digital RPG is highly interactive and engaging in nature and presents a novel approach to developing “soft” skills in construction.

Details

Engineering, Construction and Architectural Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0969-9988

Keywords

Article
Publication date: 17 April 2024

Hassan Jamil, Tanveer Zia, Tahmid Nayeem, Monica T. Whitty and Steven D'Alessandro

The current advancements in technologies and the internet industry provide users with many innovative digital devices for entertainment, communication and trade. However…

Abstract

Purpose

The current advancements in technologies and the internet industry provide users with many innovative digital devices for entertainment, communication and trade. However, simultaneous development and the rising sophistication of cybercrimes bring new challenges. Micro businesses use technology like how people use it at home, but face higher cyber risks during riskier transactions, with human error playing a significant role. Moreover, information security researchers have often studied individuals’ adherence to compliance behaviour in response to cyber threats. The study aims to examine the protection motivation theory (PMT)-based model to understand individuals’ tendency to adopt secure behaviours.

Design/methodology/approach

The study focuses on Australian micro businesses since they are more susceptible to cyberattacks due to the least security measures in place. Out of 877 questionnaires distributed online to Australian micro business owners through survey panel provider “Dynata,” 502 (N = 502) complete responses were included. Structural equational modelling was used to analyse the relationships among the variables.

Findings

The results indicate that all constructs of the protection motivation, except threat susceptibility, successfully predict the user protective behaviours. Also, increased cybersecurity costs negatively impact users’ safe cyber practices.

Originality/value

The study has critical implications for understanding micro business owners’ cyber security behaviours. The study contributes to the current knowledge of cyber security in micro businesses through the lens of PMT.

Details

Information & Computer Security, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2056-4961

Keywords

Open Access
Article
Publication date: 17 April 2024

Sara Persson

Political Corporate Social Responsibility (CSR), based on ideas about deliberative democracy, have been criticised for increasing corporate power and democratic deficits. Yet…

Abstract

Purpose

Political Corporate Social Responsibility (CSR), based on ideas about deliberative democracy, have been criticised for increasing corporate power and democratic deficits. Yet, deliberative ideals are flourishing in the corporate world in the form of dialogues with a broad set of stakeholders and engagement in wider societal issues. Extractive industry areas, with extensive corporate interventions in weak regulatory environments, are particularly vulnerable to asymmetrical power relations when businesses engage with society. This paper aims to illustrate in what way deliberative CSR practices in such contexts risk enhancing corporate power at the expense of community interests.

Design/methodology/approach

This paper is based on a retrospective qualitative study of a Canadian oil company, operating in an Albanian oilfield between 2009 and 2016. Through a study of three different deliberative CSR practices – market-based land acquisition, a grievance redress mechanism and dialogue groups – it highlights how these practices in various ways enforced corporate interests and prevented further community mobilisation.

Findings

By applying Laclau and Mouffe’s theory of hegemony, the analysis highlights how deliberative CSR activities isolated and silenced community demands, moved some community members into the corporate alliance and prevented alternative visions of the area to be articulated. In particular, the close connection between deliberative practices and monetary compensation flows is underlined in this dynamic.

Originality/value

The paper contributes to critical scholarship on political CSR by highlighting in what way deliberative practices, linked to monetary compensation schemes, enforce corporate hegemony by moving community members over to the corporate alliance.

Details

Critical Perspectives on International Business, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1742-2043

Keywords

Access

Year

Last month (7)

Content type

Earlycite article (7)
1 – 7 of 7