Search results

1 – 10 of 77
Article
Publication date: 28 October 2000

Dale Young, Houston H. Carr and R. Kelly Rainer

In this study, senior executives with electronic data interchange (EDI) experience explained the factors their firms considered when deciding to use EDI. The majority of their…

196

Abstract

In this study, senior executives with electronic data interchange (EDI) experience explained the factors their firms considered when deciding to use EDI. The majority of their comments focused on the operational (i.e., internal) benefits they are receiving from EDI. Most of the firms that participated in the study have moved from an operational mindset regarding EDI and noted external/competitive benefits as they electronically link to customers and suppliers. The executives acknowledged power inequities between their large firms and the trading partners with whom they use EDI. Although EDI is a mature technology, when classified by innovation adoption and diffusion theory, it provides adopting firms significant benefits.

Details

American Journal of Business, vol. 15 no. 2
Type: Research Article
ISSN: 1935-5181

Keywords

Article
Publication date: 1 January 2006

Kenneth J. Knapp, Thomas E. Marshall, R. Kelly Rainer and F. Nelson Ford

This study proposes to put forward and test a theoretical model that demonstrates the influence of top management support on an organization's security culture and level of…

8186

Abstract

Purpose

This study proposes to put forward and test a theoretical model that demonstrates the influence of top management support on an organization's security culture and level of security policy enforcement.

Design/methodology/approach

The project used a combination of qualitative and quantitative techniques. The grounded theory approach was used to analyze responses to open‐ended questions answered by 220 certified information system security professionals. Using these responses, a survey instrument was developed. Survey results were analyzed using structural equation modeling.

Findings

Evidence suggests that top management support is a significant predictor of an organization's security culture and level of policy enforcement.

Research limitations/implications

During instrument validation, a special effort removed survey items that appeared overly intrusive to the respondents. In this endeavor, an expert panel of security practitioners evaluated all candidate items on a willingness‐to‐answer scale. While especially helpful in security, this scale may be used in other research domains.

Practical implications

Practitioners should understand the impact of top management support on achieving security effectiveness. Based on the findings of this study, low levels of executive support will produce an organizational culture less tolerant of good security practices. Low levels of support will diminish the level of enforcement of existing security policies.

Originality/value

Researchers developed original scales to measure levels of top management support, policy enforcement, and organizational culture. The scales demonstrated acceptable reliability and validity scores.

Details

Information Management & Computer Security, vol. 14 no. 1
Type: Research Article
ISSN: 0968-5227

Keywords

Article
Publication date: 1 February 2008

Joseph B. Skipper, Christopher W. Craighead, Terry Anthony Byrd and R. Kelly Rainer

The purpose of the paper is to provide a conceptual/theoretical foundation to enhance the body of knowledge related to supply chain interdependence and technology‐enabled…

2416

Abstract

Purpose

The purpose of the paper is to provide a conceptual/theoretical foundation to enhance the body of knowledge related to supply chain interdependence and technology‐enabled coordination.

Design/methodology/approach

The paper heavily engaged itself in the theory/literature related to coordination theory, interdependence theory, interdependence, coordination and supply chain technologies to formulate the theoretical propositions.

Findings

From the literature/theoretical bases, the paper derived a total (include sub‐components) of eight theoretical propositions related to interdependence, coordination and technology enablers.

Research limitations/implications

While technology enabled‐coordination is central to supply chain management, there is a lack of a prescriptive view present in the literature. By deriving insights from the rich literature related to coordination theory and interdependence theory, we provide a theoretical foundation for future research to enhance the body of knowledge related to the systematic application of technology to foster the appropriate coordination strategy.

Practical implications

Although empirical support is warranted, the proposed concepts related to technology‐enabled coordination offer pragmatic advice to managers.

Originality/value

The paper provides a theoretical foundation for future research to enhance the body of knowledge related to the systematic application of technology to foster the appropriate coordination strategies.

Details

International Journal of Physical Distribution & Logistics Management, vol. 38 no. 1
Type: Research Article
ISSN: 0960-0035

Keywords

Book part
Publication date: 15 September 2022

Ayşen Akbaş Tuna and Zafer Türkmendağ

Cyber management of organizations includes eliminating security gaps, ensuring information confidentiality, and protecting customers' data. In addition, production and planning…

Abstract

Cyber management of organizations includes eliminating security gaps, ensuring information confidentiality, and protecting customers' data. In addition, production and planning, protecting cyber and digital infrastructure are included in the chapter. The chapter deals with these issues in the context of strategy and management. In addition, the conflicts arising from competitors to access the tacit knowledge (confidential information, commercial secrets, commercial relations, customers, and tenders) of the businesses are discussed in the chapter. Cyber conflicts have now turned into a business-to-business war. Businesses have become targets in cyberwars. This chapter, therefore, examines these issues in depth.

Article
Publication date: 21 October 2011

Robert E. Overstreet, Dianne Hall, Joe B. Hanna and R. Kelly Rainer

The purpose of this paper is to provide future researchers with a framework for conducting research in the unique field of humanitarian logistics.

7261

Abstract

Purpose

The purpose of this paper is to provide future researchers with a framework for conducting research in the unique field of humanitarian logistics.

Design/methodology/approach

The authors categorized humanitarian logistics research articles. Borrowing from the theory of constraints and management information systems literature, the authors developed a framework for research.

Findings

The review of humanitarian logistics literature indicates that researchers have begun to lay the foundation for a core body of knowledge. While there is a growing body of research in humanitarian logistics, it is predominately focused on the area of planning.

Originality/value

This effort categorizes past research using elements of logistics, develops a framework for research in humanitarian logistics, and recommends areas for further research.

Details

Journal of Humanitarian Logistics and Supply Chain Management, vol. 1 no. 2
Type: Research Article
ISSN: 2042-6747

Keywords

Article
Publication date: 1 February 1993

Christine Fidler, Simon Rogerson and Nicola Spiers

The evolving information systems (IS) field has been the subject ofmuch research and observation in recent years. Much of the work has beenUS based. By contrast, this empirical…

Abstract

The evolving information systems (IS) field has been the subject of much research and observation in recent years. Much of the work has been US based. By contrast, this empirical survey analyses the current state of IS practices within UK‐based organizations. The survey evaluates the extent of computer usage within the UK at a general level, as well as focusing on specific areas such as management support systems, IS strategic planning and strategic alignment of business and IS. Where possible, compares the results of this survey with previous surveys and forecasts, and analyses differences. Identifies topics worthy of further investigation.

Details

Information Management & Computer Security, vol. 1 no. 2
Type: Research Article
ISSN: 0968-5227

Keywords

Content available
Article
Publication date: 17 May 2013

169

Abstract

Details

Journal of Humanitarian Logistics and Supply Chain Management, vol. 3 no. 1
Type: Research Article
ISSN: 2042-6747

Article
Publication date: 17 May 2023

Sulafa Badi and Mohamed Nasaj

This study aims to assess the essential elements of internal organisational capability that influence the cybersecurity effectiveness of a construction firm. An extended McKinsey…

Abstract

Purpose

This study aims to assess the essential elements of internal organisational capability that influence the cybersecurity effectiveness of a construction firm. An extended McKinsey 7S model is used to analyse the relationship between a construction firm's cybersecurity effectiveness and nine internal capability elements: shared values, strategy, structure, systems, staff, style, skills, relationships with third parties and regulatory compliance.

Design/methodology/approach

Based on a quantitative research strategy, this study collected data through a cross-sectional survey of professionals working in the construction sector in the United Kingdom (UK). The collected data was analysed using descriptive and inferential statistical methods.

Findings

The findings underlined systems, regulatory compliance, staff and third-party relationships as the most significant elements of internal organisational capability influencing a construction firm's cybersecurity effectiveness, organised in order of importance.

Research limitations/implications

Future research possibilities are proposed including the extension of the proposed diagnostic model to consider additional external factors, examining it under varying industrial relationship conditions and developing a dynamic framework that helps improve cybersecurity capability levels while overseeing execution outcomes to ensure success.

Practical implications

The extended McKinsey 7S model can be used as a diagnostic tool to assess the organisation's internal capabilities and evaluate the effectiveness of implemented changes. This can provide specific ways for construction firms to enhance their cybersecurity effectiveness.

Originality/value

This study contributes to the field of cybersecurity in the construction industry by empirically assessing the effectiveness of cybersecurity in UK construction firms using an extended McKinsey 7S model. The study highlights the importance of two additional elements, third-party relationships and construction firm regulatory compliance, which were overlooked in the original McKinsey 7S model. By utilising this model, the study develops a concise research model of essential elements of internal organisational capability that influence cybersecurity effectiveness in construction firms.

Details

Engineering, Construction and Architectural Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0969-9988

Keywords

Article
Publication date: 18 February 2021

Rafael Renteria, Mario Chong, Irineu de Brito Junior, Ana Luna and Renato Quiliche

This paper aims to design a vulnerability assessment model considering the multidimensional and systematic approach to disaster risk and vulnerability. This model serves to both…

Abstract

Purpose

This paper aims to design a vulnerability assessment model considering the multidimensional and systematic approach to disaster risk and vulnerability. This model serves to both risk mitigation and disaster preparedness phases of humanitarian logistics.

Design/methodology/approach

A survey of 27,218 households in Pueblo Rico and Dosquebradas was conducted to obtain information about disaster risk for landslides, floods and collapses. We adopted a cross entropy-based approach for the measure of disaster vulnerability (Kullback–Leibler divergence), and a maximum-entropy estimation for the reconstruction of risk a priori categorization (logistic regression). The capabilities approach of Sen supported theoretically our multidimensional assessment of disaster vulnerability.

Findings

Disaster vulnerability is shaped by economic, such as physical attributes of households, and health indicators, which are in specific morbidity indicators that seem to affect vulnerability outputs. Vulnerability is heterogeneous between communities/districts according to formal comparisons of Kullback–Leibler divergence. Nor social dimension, neither chronic illness indicators seem to shape vulnerability, at least for Pueblo Rico and Dosquebradas.

Research limitations/implications

The results need a qualitative or case study validation at the community/district level.

Practical implications

We discuss how risk mitigation policies and disaster preparedness strategies can be driven by empirical results. For example, the type of stock to preposition can vary according to the disaster or the kind of alternative policies that can be formulated on the basis of the strong relationship between morbidity and disaster risk.

Originality/value

Entropy-based metrics are not widely used in humanitarian logistics literature, as well as empirical data-driven techniques.

Details

Journal of Humanitarian Logistics and Supply Chain Management, vol. 11 no. 3
Type: Research Article
ISSN: 2042-6747

Keywords

Article
Publication date: 26 March 2024

Çağla Cergibozan and İlker Gölcük

The study aims to propose a decision-support system to determine the location of a regional disaster logistics warehouse. Emphasizing the importance of disaster logistics, it…

Abstract

Purpose

The study aims to propose a decision-support system to determine the location of a regional disaster logistics warehouse. Emphasizing the importance of disaster logistics, it considers the criteria to be evaluated for warehouse location selection. It is aimed to determine a warehouse location that will serve the disaster victims most efficiently in case of a disaster by making an application for the province of Izmir, where a massive earthquake hit in 2020.

Design/methodology/approach

The paper proposes a fuzzy best–worst method to evaluate the alternative locations for the warehouse. The method considers the linguistic evaluations of the decision-makers and provides an advantage in terms of comparison consistency. The alternatives were identified through interviews and discussions with a group of experts in the fields of humanitarian aid and disaster relief operations. The group consists of academics and a vice-governor, who had worked in Izmir. The results of a previously conducted questionnaire were also used in determining these locations.

Findings

It is shown how the method will be applied to this problem, and the most effective location for the disaster logistics warehouse in Izmir has been determined.

Originality/value

This study contributes to disaster preparedness and brings a solution to the organization of the logistics services in Izmir.

Details

Kybernetes, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0368-492X

Keywords

1 – 10 of 77