Search results
1 – 10 of 77Dale Young, Houston H. Carr and R. Kelly Rainer
In this study, senior executives with electronic data interchange (EDI) experience explained the factors their firms considered when deciding to use EDI. The majority of their…
Abstract
In this study, senior executives with electronic data interchange (EDI) experience explained the factors their firms considered when deciding to use EDI. The majority of their comments focused on the operational (i.e., internal) benefits they are receiving from EDI. Most of the firms that participated in the study have moved from an operational mindset regarding EDI and noted external/competitive benefits as they electronically link to customers and suppliers. The executives acknowledged power inequities between their large firms and the trading partners with whom they use EDI. Although EDI is a mature technology, when classified by innovation adoption and diffusion theory, it provides adopting firms significant benefits.
Details
Keywords
Kenneth J. Knapp, Thomas E. Marshall, R. Kelly Rainer and F. Nelson Ford
This study proposes to put forward and test a theoretical model that demonstrates the influence of top management support on an organization's security culture and level of…
Abstract
Purpose
This study proposes to put forward and test a theoretical model that demonstrates the influence of top management support on an organization's security culture and level of security policy enforcement.
Design/methodology/approach
The project used a combination of qualitative and quantitative techniques. The grounded theory approach was used to analyze responses to open‐ended questions answered by 220 certified information system security professionals. Using these responses, a survey instrument was developed. Survey results were analyzed using structural equation modeling.
Findings
Evidence suggests that top management support is a significant predictor of an organization's security culture and level of policy enforcement.
Research limitations/implications
During instrument validation, a special effort removed survey items that appeared overly intrusive to the respondents. In this endeavor, an expert panel of security practitioners evaluated all candidate items on a willingness‐to‐answer scale. While especially helpful in security, this scale may be used in other research domains.
Practical implications
Practitioners should understand the impact of top management support on achieving security effectiveness. Based on the findings of this study, low levels of executive support will produce an organizational culture less tolerant of good security practices. Low levels of support will diminish the level of enforcement of existing security policies.
Originality/value
Researchers developed original scales to measure levels of top management support, policy enforcement, and organizational culture. The scales demonstrated acceptable reliability and validity scores.
Details
Keywords
Joseph B. Skipper, Christopher W. Craighead, Terry Anthony Byrd and R. Kelly Rainer
The purpose of the paper is to provide a conceptual/theoretical foundation to enhance the body of knowledge related to supply chain interdependence and technology‐enabled…
Abstract
Purpose
The purpose of the paper is to provide a conceptual/theoretical foundation to enhance the body of knowledge related to supply chain interdependence and technology‐enabled coordination.
Design/methodology/approach
The paper heavily engaged itself in the theory/literature related to coordination theory, interdependence theory, interdependence, coordination and supply chain technologies to formulate the theoretical propositions.
Findings
From the literature/theoretical bases, the paper derived a total (include sub‐components) of eight theoretical propositions related to interdependence, coordination and technology enablers.
Research limitations/implications
While technology enabled‐coordination is central to supply chain management, there is a lack of a prescriptive view present in the literature. By deriving insights from the rich literature related to coordination theory and interdependence theory, we provide a theoretical foundation for future research to enhance the body of knowledge related to the systematic application of technology to foster the appropriate coordination strategy.
Practical implications
Although empirical support is warranted, the proposed concepts related to technology‐enabled coordination offer pragmatic advice to managers.
Originality/value
The paper provides a theoretical foundation for future research to enhance the body of knowledge related to the systematic application of technology to foster the appropriate coordination strategies.
Details
Keywords
Ayşen Akbaş Tuna and Zafer Türkmendağ
Cyber management of organizations includes eliminating security gaps, ensuring information confidentiality, and protecting customers' data. In addition, production and planning…
Abstract
Cyber management of organizations includes eliminating security gaps, ensuring information confidentiality, and protecting customers' data. In addition, production and planning, protecting cyber and digital infrastructure are included in the chapter. The chapter deals with these issues in the context of strategy and management. In addition, the conflicts arising from competitors to access the tacit knowledge (confidential information, commercial secrets, commercial relations, customers, and tenders) of the businesses are discussed in the chapter. Cyber conflicts have now turned into a business-to-business war. Businesses have become targets in cyberwars. This chapter, therefore, examines these issues in depth.
Details
Keywords
Robert E. Overstreet, Dianne Hall, Joe B. Hanna and R. Kelly Rainer
The purpose of this paper is to provide future researchers with a framework for conducting research in the unique field of humanitarian logistics.
Abstract
Purpose
The purpose of this paper is to provide future researchers with a framework for conducting research in the unique field of humanitarian logistics.
Design/methodology/approach
The authors categorized humanitarian logistics research articles. Borrowing from the theory of constraints and management information systems literature, the authors developed a framework for research.
Findings
The review of humanitarian logistics literature indicates that researchers have begun to lay the foundation for a core body of knowledge. While there is a growing body of research in humanitarian logistics, it is predominately focused on the area of planning.
Originality/value
This effort categorizes past research using elements of logistics, develops a framework for research in humanitarian logistics, and recommends areas for further research.
Details
Keywords
Christine Fidler, Simon Rogerson and Nicola Spiers
The evolving information systems (IS) field has been the subject ofmuch research and observation in recent years. Much of the work has beenUS based. By contrast, this empirical…
Abstract
The evolving information systems (IS) field has been the subject of much research and observation in recent years. Much of the work has been US based. By contrast, this empirical survey analyses the current state of IS practices within UK‐based organizations. The survey evaluates the extent of computer usage within the UK at a general level, as well as focusing on specific areas such as management support systems, IS strategic planning and strategic alignment of business and IS. Where possible, compares the results of this survey with previous surveys and forecasts, and analyses differences. Identifies topics worthy of further investigation.
Details
Keywords
This study aims to assess the essential elements of internal organisational capability that influence the cybersecurity effectiveness of a construction firm. An extended McKinsey…
Abstract
Purpose
This study aims to assess the essential elements of internal organisational capability that influence the cybersecurity effectiveness of a construction firm. An extended McKinsey 7S model is used to analyse the relationship between a construction firm's cybersecurity effectiveness and nine internal capability elements: shared values, strategy, structure, systems, staff, style, skills, relationships with third parties and regulatory compliance.
Design/methodology/approach
Based on a quantitative research strategy, this study collected data through a cross-sectional survey of professionals working in the construction sector in the United Kingdom (UK). The collected data was analysed using descriptive and inferential statistical methods.
Findings
The findings underlined systems, regulatory compliance, staff and third-party relationships as the most significant elements of internal organisational capability influencing a construction firm's cybersecurity effectiveness, organised in order of importance.
Research limitations/implications
Future research possibilities are proposed including the extension of the proposed diagnostic model to consider additional external factors, examining it under varying industrial relationship conditions and developing a dynamic framework that helps improve cybersecurity capability levels while overseeing execution outcomes to ensure success.
Practical implications
The extended McKinsey 7S model can be used as a diagnostic tool to assess the organisation's internal capabilities and evaluate the effectiveness of implemented changes. This can provide specific ways for construction firms to enhance their cybersecurity effectiveness.
Originality/value
This study contributes to the field of cybersecurity in the construction industry by empirically assessing the effectiveness of cybersecurity in UK construction firms using an extended McKinsey 7S model. The study highlights the importance of two additional elements, third-party relationships and construction firm regulatory compliance, which were overlooked in the original McKinsey 7S model. By utilising this model, the study develops a concise research model of essential elements of internal organisational capability that influence cybersecurity effectiveness in construction firms.
Details
Keywords
Rafael Renteria, Mario Chong, Irineu de Brito Junior, Ana Luna and Renato Quiliche
This paper aims to design a vulnerability assessment model considering the multidimensional and systematic approach to disaster risk and vulnerability. This model serves to both…
Abstract
Purpose
This paper aims to design a vulnerability assessment model considering the multidimensional and systematic approach to disaster risk and vulnerability. This model serves to both risk mitigation and disaster preparedness phases of humanitarian logistics.
Design/methodology/approach
A survey of 27,218 households in Pueblo Rico and Dosquebradas was conducted to obtain information about disaster risk for landslides, floods and collapses. We adopted a cross entropy-based approach for the measure of disaster vulnerability (Kullback–Leibler divergence), and a maximum-entropy estimation for the reconstruction of risk a priori categorization (logistic regression). The capabilities approach of Sen supported theoretically our multidimensional assessment of disaster vulnerability.
Findings
Disaster vulnerability is shaped by economic, such as physical attributes of households, and health indicators, which are in specific morbidity indicators that seem to affect vulnerability outputs. Vulnerability is heterogeneous between communities/districts according to formal comparisons of Kullback–Leibler divergence. Nor social dimension, neither chronic illness indicators seem to shape vulnerability, at least for Pueblo Rico and Dosquebradas.
Research limitations/implications
The results need a qualitative or case study validation at the community/district level.
Practical implications
We discuss how risk mitigation policies and disaster preparedness strategies can be driven by empirical results. For example, the type of stock to preposition can vary according to the disaster or the kind of alternative policies that can be formulated on the basis of the strong relationship between morbidity and disaster risk.
Originality/value
Entropy-based metrics are not widely used in humanitarian logistics literature, as well as empirical data-driven techniques.
Details
Keywords
Çağla Cergibozan and İlker Gölcük
The study aims to propose a decision-support system to determine the location of a regional disaster logistics warehouse. Emphasizing the importance of disaster logistics, it…
Abstract
Purpose
The study aims to propose a decision-support system to determine the location of a regional disaster logistics warehouse. Emphasizing the importance of disaster logistics, it considers the criteria to be evaluated for warehouse location selection. It is aimed to determine a warehouse location that will serve the disaster victims most efficiently in case of a disaster by making an application for the province of Izmir, where a massive earthquake hit in 2020.
Design/methodology/approach
The paper proposes a fuzzy best–worst method to evaluate the alternative locations for the warehouse. The method considers the linguistic evaluations of the decision-makers and provides an advantage in terms of comparison consistency. The alternatives were identified through interviews and discussions with a group of experts in the fields of humanitarian aid and disaster relief operations. The group consists of academics and a vice-governor, who had worked in Izmir. The results of a previously conducted questionnaire were also used in determining these locations.
Findings
It is shown how the method will be applied to this problem, and the most effective location for the disaster logistics warehouse in Izmir has been determined.
Originality/value
This study contributes to disaster preparedness and brings a solution to the organization of the logistics services in Izmir.
Details