Search results

1 – 10 of over 1000
Article
Publication date: 13 April 2023

Chunqing Li, Xiaoli Wang, Jieli Zhang and Chenxi Li

This paper aims to explore the key elements and dynamic formation mechanisms involved in the company identity construction during multicompany identification.

Abstract

Purpose

This paper aims to explore the key elements and dynamic formation mechanisms involved in the company identity construction during multicompany identification.

Design/methodology/approach

This study adopted a longitudinal single case study method, selected a representative company as the study case and analyzed the interactive practice of identity construction between the company and its external stakeholders based on the theory of organizational identity and sensemaking.

Findings

This study finds that the process of company identity construction for external stakeholders involves six elements. Companies mainly use a highly controlled, equality and interaction model to develop identity for a single stakeholder. Company identity is based on the company’s core identity claims and is formed by gradually integrating and cooperating with the identity claims of different stakeholders. Meeting the self-defining needs of stakeholders is a key driving force behind the evolution of company identity.

Practical implications

This study offers practical implications for companies to pursue and construct multicompany identity. For different types of external stakeholders, companies can adopt different identity sensemaking models. To build a new company identity, a company needs to do more on the basis of identity insights to break cognitive constraints and build new identity claim. Companies need to integrate new identity claims with the original identity claims. If different identity claims conflict or are difficult to reconcile, it may damage their original identity claims and companies need to evaluate the trade-offs.

Originality/value

This study expands the concept of company identity construction from the individual perspective to organizational identity and contributes to research in relationship marketing. This study identifies the key elements of company identity construction with multistakeholder participation and contributes to theory building in company identity research. The results of this study reveal the company identity construction mechanism for different external stakeholders and the dynamic formation process of multicompany identity.

Details

Nankai Business Review International, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2040-8749

Keywords

Article
Publication date: 30 May 2023

Ganghua Chen, Siqi Bie, Carol Zhang and Zhenghuan Li

This study aims to contribute to social identity theory in tourism by exploring the reflections of Chinese tourists visiting North Korea and how they negotiate their intergroup…

Abstract

Purpose

This study aims to contribute to social identity theory in tourism by exploring the reflections of Chinese tourists visiting North Korea and how they negotiate their intergroup identity in this similar-others destination.

Design/methodology/approach

Data were collected via online platforms and in-depth interviews. A qualitative approach, i.e. thematic analysis, was used to analyse the two sets of data.

Findings

Results showed that when encountering North Koreans perceived as similar others amid the social, economic and political environments in which they were embedded, Chinese tourists often categorised themselves as ordinary tourists, preferentially treated tourists and vicarious tourists based on intergroup similarities to North Koreans. They also performed intergroup comparison to boost their self-esteem at group and collective levels and developed corresponding strategies to generate distinct emotional group commitments.

Practical implications

It is recommended that destinations reinforce the friendly and unique relationship with their similar-others source markets to improve their attractiveness. Destinations should also strive to enhance the experience of tourists from their similar-others markets by arousing their positive collective-level affection, emotional resonance and nostalgic memories and avoiding negative emotions.

Originality/value

This study offers a theoretical framework analysing the features of tourists’ social identities while visiting a similar-others destination, contributing to our understanding of the interactive and contingency nature of social identity in tourism, and responding to the call for addressing the broader social contexts in which tourists’ group identity is embedded.

目的

本文致力于探索赴朝中国游客的反思以及他们在这个“类似他者”目的地如何协商群际身份, 以对旅游领域的身份认同理论做出贡献。

设计/方案

本文运用主题分析方法; 资料来源于网络文本和深度访谈。

发现

当中国游客面对被视为“类似他者”的朝鲜人时(具有相似的社会、经济和政治环境), 他们会根据与朝鲜人的群际相似性, 将自我分类为“普通游客”、“受优待者”和“过来人”三类。此外, 他们还会通过群际比较来提高群体层面和集体层面的自尊, 并且采取对应策略以产生不同的群体承诺。

价值

本文提出了一个分析游客访问“类似他者”目的地时的社会认同的理论框架, 对理解旅游中的社会认同的互动性和偶然性做出了贡献, 并响应了在考察游客群体认同时关注其所处的更广泛的社会背景的呼吁。

实践启示

目的地应该强化它们与“类似他者”客源市场之间友好且独特的关系, 以提升自身吸引力。目的地还应该唤醒游客积极的集体情感和怀旧, 产生主客情感共鸣, 并避免负面情绪, 以尽力提升来自“类似他者”客源地的游客的体验。

Propósito

Este estudio pretende contribuir a la teoría de la identidad social en turismo mediante la exploración de las reflexiones de los turistas chinos que visitan Corea del Norte y cómo negocian su identidad intergrupal en este destino similar a otros.

Diseño/metodología/enfoque

Los datos se recogieron mediante plataformas en línea y entrevistas en profundidad. Se utilizó un enfoque cualitativo a través de análisis temático para analizar los dos conjuntos de datos.

Resultados

Los resultados mostraron que, al encontrarse con norcoreanos percibidos como otros similares en el entorno social, económico y político en el que estaban integrados, los turistas chinos a menudo se categorizaban a sí mismos como turistas ordinarios, turistas con trato preferente y turistas vicarios basándose en las similitudes intergrupales con los norcoreanos. También, realizaban comparaciones intergrupales para aumentar su autoestima a nivel grupal y colectivo, y desarrollaban las estrategias correspondientes para generar distintos compromisos emocionales grupales.

Originalidad/valor

Se presenta un marco teórico en el que se analizan las características de las identidades sociales de los turistas que visitan un destino similar a otro, lo que contribuye a nuestra comprensión de la naturaleza interactiva y contingente de la identidad social en turismo y responde a la necesidad de abordar los contextos sociales más amplios en los que se inserta la identidad de grupo de los turistas.

Implicaciones prácticas

Se recomienda que los destinos refuercen las relaciones amistosas y únicas con sus mercados emisores similares para mejorar su atractividad. Los destinos deberían esforzarse por mejorar la experiencia de los turistas de sus mercados emisores similares, estimulando su afecto positivo a nivel colectivo, su resonancia emocional y sus recuerdos nostálgicos, y evitando las emociones negativas.

Article
Publication date: 22 June 2022

Shubangini Patil and Rekha Patil

Until now, a lot of research has been done and applied to provide security and original data from one user to another, such as third-party auditing and several schemes for…

Abstract

Purpose

Until now, a lot of research has been done and applied to provide security and original data from one user to another, such as third-party auditing and several schemes for securing the data, such as the generation of the key with the help of encryption algorithms like Rivest–Shamir–Adleman and others. Here are some of the related works that have been done previously. Remote damage control resuscitation (RDCR) scheme by Yan et al. (2017) is proposed based on the minimum bandwidth. By enabling the third party to perform the verification of public integrity. Although it supports the repair management for the corrupt data and tries to recover the original data, in practicality it fails to do so, and thus it takes more computation and communication cost than our proposed system. In a paper by Chen et al. (2015), using broadcast encryption, an idea for cloud storage data sharing has been developed. This technique aims to accomplish both broadcast data and dynamic sharing, allowing users to join and leave a group without affecting the electronic press kit (EPK). In this case, the theoretical notion was true and new, but the system’s practicality and efficiency were not acceptable, and the system’s security was also jeopardised because it proposed adding a member without altering any keys. In this research, an identity-based encryption strategy for data sharing was investigated, as well as key management and metadata techniques to improve model security (Jiang and Guo, 2017). The forward and reverse ciphertext security is supplied here. However, it is more difficult to put into practice, and one of its limitations is that it can only be used for very large amounts of cloud storage. Here, it extends support for dynamic data modification by batch auditing. The important feature of the secure and efficient privacy preserving provable data possession in cloud storage scheme was to support every important feature which includes data dynamics, privacy preservation, batch auditing and blockers verification for an untrusted and an outsourced storage model (Pathare and Chouragadec, 2017). A homomorphic signature mechanism was devised to prevent the usage of the public key certificate, which was based on the new id. This signature system was shown to be resistant to the id attack on the random oracle model and the assault of forged message (Nayak and Tripathy, 2018; Lin et al., 2017). When storing data in a public cloud, one issue is that the data owner must give an enormous number of keys to the users in order for them to access the files. At this place, the knowledge assisted software engineering (KASE) plan was publicly unveiled for the first time. While sharing a huge number of documents, the data owner simply has to supply the specific key to the user, and the user only needs to provide the single trapdoor. Although the concept is innovative, the KASE technique does not apply to the increasingly common manufactured cloud. Cui et al. (2016) claim that as the amount of data grows, distribution management system (DMS) will be unable to handle it. As a result, various proven data possession (PDP) schemes have been developed, and practically all data lacks security. So, here in these certificates, PDP was introduced, which was based on bilinear pairing. Because of its feature of being robust as well as efficient, this is mostly applicable in DMS. The main purpose of this research is to design and implement a secure cloud infrastructure for sharing group data. This research provides an efficient and secure protocol for multiple user data in the cloud, allowing many users to easily share data.

Design/methodology/approach

The methodology and contribution of this paper is given as follows. The major goal of this study is to design and implement a secure cloud infrastructure for sharing group data. This study provides an efficient and secure protocol for multiple user data in cloud, allowing several users to share data without difficulty. The primary purpose of this research is to design and implement a secure cloud infrastructure for sharing group data. This research develops an efficient and secure protocol for multiple user data in the cloud, allowing numerous users to exchange data without difficulty. Selection scheme design (SSD) comprises two algorithms; first algorithm is designed for limited users and algorithm 2 is redesigned for the multiple users. Further, the authors design SSD-security protocol which comprises a three-phase model, namely, Phase 1, Phase 2 and Phase 3. Phase 1 generates the parameters and distributes the private key, the second phase generates the general key for all the users that are available and third phase is designed to prevent the dishonest user to entertain in data sharing.

Findings

Data sharing in cloud computing provides unlimited computational resources and storage to enterprise and individuals; moreover, cloud computing leads to several privacy and security concerns such as fault tolerance, reliability, confidentiality and data integrity. Furthermore, the key consensus mechanism is fundamental cryptographic primitive for secure communication; moreover, motivated by this phenomenon, the authors developed SSDmechanismwhich embraces the multiple users in the data-sharing model.

Originality/value

Files shared in the cloud should be encrypted for security purpose; later these files are decrypted for the users to access the file. Furthermore, the key consensus process is a crucial cryptographic primitive for secure communication; additionally, the authors devised the SSD mechanism, which incorporates numerous users in the data-sharing model, as a result of this phenomena. For evaluation of the SSD method, the authors have considered the ideal environment of the system, that is, the authors have used java as a programming language and eclipse as the integrated drive electronics tool for the proposed model evaluation. Hardware configuration of the model is such that it is packed with 4 GB RAM and i7 processor, the authors have used the PBC library for the pairing operations (PBC Library, 2022). Furthermore, in the following section of this paper, the number of users is varied to compare with the existing methodology RDIC (Li et al., 2020). For the purposes of the SSD-security protocol, a prime number is chosen as the number of users in this work.

Details

International Journal of Pervasive Computing and Communications, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1742-7371

Keywords

Open Access
Article
Publication date: 19 March 2024

Doris Ngozi Morah and Oluchukwu Augustina Nwafor

The study investigates factors like media, tribal, religious and party politics' influence on Nigerias’ 2023 presidential election choice. It confirms dominant social media…

Abstract

Purpose

The study investigates factors like media, tribal, religious and party politics' influence on Nigerias’ 2023 presidential election choice. It confirms dominant social media platforms and examines their influence on election polls, e-participation and political candidate choice. The main objectives of this study are to: investigate if tribal, religious and party politics affect the respondent’s choice of a presidential candidate, ascertain the respondent's most used social media platform for political engagement and determine how social media platforms influenced the election polls during the 2023 Nigerian presidential election.

Design/methodology/approach

A sample size of 384 registered voters was used to survey three states in Southeast Nigeria hinged on the technological acceptance model, the instrumentalist theory of ethnicity and the theory of reasoned action.

Findings

The study found that tribal politics did not influence political candidates during the 2023 Nigerian presidential election. However, religious and party politics influenced their choices as well as X (Twitter), found as the most used and most influential social media platform vital for enhancing participatory democracy and informing people at real-time.

Research limitations/implications

The researchers experienced challenges such as ensuring that the respondents filled the questions appropriately to reduce the number of void questionnaires and a funding problem since they had yet to receive any grant to enhance the study.

Originality/value

The study commends improved Internet connectivity and accessibility among the citizens for increased political engagement on social media. It also recommends that the Nigerian government enforce the rule of law in politics to enable diverse tribes and religions to experience democratic e-participation and development without marginalisation or subjugation by incumbent power. The findings affirm that social media is apt in political communication during the 2023 presidential elections in Nigeria. The study is a contribution to knowledge, timely and original.

Details

Journal of Innovative Digital Transformation, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2976-9051

Keywords

Article
Publication date: 18 March 2024

Alisha Tuladhar, Michael Rogerson, Juliette Engelhart, Glenn C. Parry and Birgit Altrichter

Firms are increasingly pressured to comply with mandatory supply chain transparency (SCT) regulations. Drawing on information processing theory (IPT), this study aims to show how…

Abstract

Purpose

Firms are increasingly pressured to comply with mandatory supply chain transparency (SCT) regulations. Drawing on information processing theory (IPT), this study aims to show how blockchain technology can address information uncertainty and equivocality in assuring regulatory compliance in an interorganizational network (ION).

Design/methodology/approach

IPT is applied in a single case study of an ION in the mining industry that aimed to implement blockchain to address mandatory SCT regulations. The authors build on a rich proprietary data set consisting of interviews and substantial secondary material from actors along the supply chain.

Findings

The case shows that blockchain creates equality between actors, enables compliance and enhances efficiency in an ION, reducing information uncertainty and equivocality arising from conflict minerals regulation. The system promotes engagement and data sharing between parties while protecting commercial sensitive information. The lack of central authority prevents larger partners from taking control. The system provides mineral provenance and a regulation-compliant record. System cost analysis shows that the system is efficient as it is inexpensive relative to volumes and values of metals transacted. Issues were identified related to collecting richer human rights data for assurance and compliance with due diligence regulations.

Originality/value

The authors provide some of the first evidence in the operations and supply chain management literature of the specific architecture, costs and limitations of using blockchain for SCT. Using an IPT lens in an ION setting, the authors demonstrate how blockchain-based systems can address two key IPT challenges: environmental uncertainty and equivocality.

Details

Supply Chain Management: An International Journal, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1359-8546

Keywords

Open Access
Article
Publication date: 27 February 2024

Mehmet Emin Bakir, Tracie Farrell and Kalina Bontcheva

The authors investigate how COVID-19 has influenced the amount, type or topics of abuse that UK politicians receive when engaging with the public.

Abstract

Purpose

The authors investigate how COVID-19 has influenced the amount, type or topics of abuse that UK politicians receive when engaging with the public.

Design/methodology/approach

This work covers the first year of COVID-19 in the UK, from March 2020 to March 2021 and analyses Twitter abuse in replies to UK MPs. The authors collected and analysed 17.9 million reply tweets to the MPs. The authors present overall abuse levels during different key moments of the pandemic, analysing reactions to MPs by gender and the relationship between online abuse and topics such as Brexit, the government’s COVID-19 response and policies, and social issues.

Findings

The authors have found that abuse levels towards UK MPs were at an all-time high in December 2020. Women (particularly those from non-White backgrounds) receive unusual amounts of abuse, targeting their credibility and capacity to do their jobs. Similar to other large events like general elections and Brexit, COVID-19 has elevated abuse levels, at least temporarily.

Originality/value

Previous studies analysed abuse levels towards MPs in the run-up to the 2017 and 2019 UK General Elections and during the first four months of the COVID-19 pandemic in the UK. The authors compare previous findings with those of the first year of COVID-19, as the pandemic persisted, and Brexit was forthcoming. This research not only contributes to the longitudinal comparison of abuse trends against UK politicians but also presents new findings, corroborates, further clarifies and raises questions about the previous findings.

Peer review

The peer review history for this article is available at: https://publons.com/publon/10.1108/OIR-07-2022-0392

Details

Online Information Review, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1468-4527

Keywords

Article
Publication date: 19 October 2023

Rasha Kassem and Elisabeth Carter

This paper aims to systematically review over two decades of academic articles on romance fraud to provide a holistic insight into this crime and identify literature gaps.

Abstract

Purpose

This paper aims to systematically review over two decades of academic articles on romance fraud to provide a holistic insight into this crime and identify literature gaps.

Design/methodology/approach

More than two decades of peer-reviewed academic journal articles from 2000 to 2023 were systematically reviewed using multiple search engines and databases for relevant papers, identified through searches of paper titles, keywords, abstracts and primary texts.

Findings

The findings reveal 10 themes: i) the definitions and terminology of romance fraud; ii) romance fraud’s impact on victims; iii) the profile of romance fraud criminals and victims; iv) romance fraud methods and techniques; v) why victims become susceptible to romance fraud; vi) the psychology of romance fraud criminals; vii) the links between romance fraud and other crimes; viii) the challenges of investigating romance fraud; ix) preventing romance fraud and protecting victims; and x) how romance fraud victims can be supported.

Practical implications

The paper reveals implications regarding the future direction of policy and strategy to address the pervasive low reporting rates and narratives of shame bound with victims of this crime.

Originality/value

Romance fraud is a serious crime against individuals with impacts beyond financial losses. Still, this fraud type is under-researched, and the literature lacks a holistic view of this crime. To the best of the authors’ knowledge, this is the first systematic literature review providing a holistic view of romance fraud. It combines evidence across the academic landscape to reveal the breadth and depth of the current work concerning romance fraud and identify gaps in the understanding of this fraud crime.

Details

Journal of Financial Crime, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1359-0790

Keywords

Article
Publication date: 9 May 2023

A.J. George and Julie-Anne Tarr

To increase university–industry collaboration and research commercialisation, the Australian government recently introduced the Intellectual Property (IP) Framework, a set of…

Abstract

Purpose

To increase university–industry collaboration and research commercialisation, the Australian government recently introduced the Intellectual Property (IP) Framework, a set of online standard contracts. This follows a predecessor standard contract initiative, the IP Toolkit, which has not previously been evaluated. This paper aims to examine standard contracting in the innovation sector, tracing the policymaking behind the IP Toolkit using the lens of Macneil’s relational contract theory, to assess prospects of success for the new IP Framework, and similar initiatives in other jurisdictions.

Design/methodology/approach

This is a disciplined-configurative case study, drawing on qualitative secondary data analysis and applying Macneil’s relational contracting theory to guide case construction and generate hypotheses around likely success of standard contracting initiatives (stakeholder sentiment, stakeholder adoption). Within-case analysis process-traces development of the IP Toolkit, to discover what the policymakers wanted, knew and computed – and to detail observable implications Macneil’s theory predicts. Its themes are triangulated with multiple sources.

Findings

The case study, via Macneil’s theory, confirms the first hypothesis (resistant stakeholder sentiment) and partly validates the second hypothesis (low levels of adoption), demonstrating limited suitability of standard contracting in the dynamic and highly uncertain space of university–industry collaboration.

Research limitations/implications

The study provides insights into the limited role that standard contracts can play in improving national collaborative research and development performance.

Originality/value

This is a novel theory-driven case study triangulated with previously unpublished data on the IP Toolkit’s website usage, and data from recent consultations on the new IP Framework. It has broader implications for other jurisdictions considering adoption of the standard contract model.

Details

Journal of Science and Technology Policy Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2053-4620

Keywords

Article
Publication date: 24 June 2022

Maitri Patel, Rajan Patel, Nimisha Patel, Parita Shah and Kamal Gulati

In the field of cryptography, authentication, secrecy and identification can be accomplished by use of secret keys for any computer-based system. The need to acquire certificates…

Abstract

Purpose

In the field of cryptography, authentication, secrecy and identification can be accomplished by use of secret keys for any computer-based system. The need to acquire certificates endorsed through CA to substantiate users for the barter of encoded communications is one of the most significant constraints for the extensive recognition of PKC, as the technique takes too much time and susceptible to error. PKC’s certificate and key management operating costs are reduced with IBC. IBE is a crucial primeval in IBC. The thought behind presenting the IBE scheme was to diminish the complexity of certificate and key management, but it also gives rise to key escrow and key revocation problem, which provides access to unauthorised users for the encrypted information.

Design/methodology/approach

This paper aims to compare the result of IIBES with the existing system and to provide security analysis for the same and the proposed system can be used for the security in federated learning.

Findings

Furthermore, it can be implemented using other encryption/decryption algorithms like elliptic curve cryptography (ECC) to compare the execution efficiency. The proposed system can be used for the security in federated learning.

Originality/value

As a result, a novel enhanced IBE scheme: IIBES is suggested and implemented in JAVA programming language using RSA algorithm, which eradicates the key escrow problem through eliminating the need for a KGC and key revocation problem by sing sub-KGC (SKGC) and a shared secret with nonce. IIBES also provides authentication through IBS as well as it can be used for securing the data in federated learning.

Details

International Journal of Pervasive Computing and Communications, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 2 October 2023

Ambareen Beebeejaun and Bhavna Mahadew

Due to their particular nature, virtual assets (VA) are vulnerable to financial crimes such as money laundering and if the appropriate legal mechanisms are not established, this…

Abstract

Purpose

Due to their particular nature, virtual assets (VA) are vulnerable to financial crimes such as money laundering and if the appropriate legal mechanisms are not established, this may result in the financial collapse of various economies. To this effect, best practices and standards have been published by some international organisations such as the Financial Action Task Force and IMF which are now domesticated in the national laws of several countries. Therefore, the purpose of this study is to analyse the anti-money laundering (AML) legislative framework in the context of VA in three countries, namely, Mauritius, Japan and South Africa.

Design/methodology/approach

To achieve the research objective, the Mauritian AML laws in the context of VA were compared with the corresponding laws of some other countries, namely, Japan and South Africa. As such, a qualitative research method was adopted. In particular, the black letter approach was used to examine the relevant laws of these countries. A comparative analysis was conducted concerning the relevance of AML laws for each country when dealing with VA with the view of suggesting recommendations for Mauritian stakeholders to adopt to enhance the existing AML legal and regulatory framework.

Findings

The comparative study conducted has revealed that there are both similarities and divergences among the AML framework of the three countries further to which this research recommends that the Mauritian laws must be amended concerning the duration of information storage on VA, the definition of VA, advertisement by VA service providers and the electronic submission of annual reports. The Mauritian regulatory bodies also need to play a more active role in their joint collaboration to monitor suspicious VA transactions to combat money laundering.

Originality/value

At present, this study will be among the first academic writings on the efficiency of AML laws in the context of VA in Mauritius and also, because existing literature is quite scarce on assessing the adequacy of AML legislation in developing countries, this research aims at filling in the gap in literature. This study is carried out with the aim of combining a large amount of empirical, theoretical and factual information that can be of use to various stakeholders and not only to academics.

Details

Journal of Money Laundering Control, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1368-5201

Keywords

1 – 10 of over 1000