Search results

1 – 10 of over 1000
Article
Publication date: 21 June 2023

Mehmet Kirmizi and Batuhan Kocaoglu

This study aims to analyze and synthesize the design features of existing digital transformation maturity models with a developed classification scheme and propose a generic…

Abstract

Purpose

This study aims to analyze and synthesize the design features of existing digital transformation maturity models with a developed classification scheme and propose a generic maturity model development wireframe based on design science research.

Design/methodology/approach

A systematic literature review is conducted on digital transformation maturity models in peer-reviewed journals, including the Emerald Insight, Science Direct, Scopus, Taylor & Francis and Web of Science databases, which resulted in 21 studies. A concept-centric tabular approach is used to analyze the studies, and intersectional demonstrations are used to synthesize the findings regarding the design features.

Findings

The classification scheme derived from the tabular concept-centric approach and iteratively evolved results in three main and 25 subcategories related to the design features. Analysis and synthesis of the studies reveal the granularity of the existing digital transformation maturity models concerning the design features. Furthermore, considering the design features in the classification scheme, a generic maturity model development wireframe is proposed to guide the researchers.

Research limitations/implications

The generic maturity model development wireframe and the classification scheme that represents the design features of existing maturity models guide the researchers for the maturity model development roadmap.

Originality/value

The existing literature review studies do not focus on the design feature of digital transformation maturity models within a systematic literature review perspective. A unique classification scheme derived from the tabular concept-centric approach aims to analyze the granularity level of the existing models. Furthermore, the generic maturity model development wireframe includes the guidelines and recommendations of design science studies and presents a roadmap for maturity model researchers.

Details

Journal of Modelling in Management, vol. 19 no. 2
Type: Research Article
ISSN: 1746-5664

Keywords

Article
Publication date: 1 June 2023

Khalid Shaheen and Ali Hussein Zolait

This study aims to determine the impacts of the Bahrain Government framework [cyber-trust program (CTP)] on the cybersecurity maturity of government entities and how the CTP can…

Abstract

Purpose

This study aims to determine the impacts of the Bahrain Government framework [cyber-trust program (CTP)] on the cybersecurity maturity of government entities and how the CTP can impact the cybersecurity of government entities in the Kingdom of Bahrain.

Design/methodology/approach

The authors used a quantitative and qualitative approach. The data were collected by conducting semi-structured interviews with the information technology experts in the Bahrain Government entities participating in the CTP. Also, quantitative data was obtained through a questionnaire distributed to relevant people in the information technology field.

Findings

The findings of this study suggest that the CTP had a significant impact on the cybersecurity assurance of the government entities that participated in the CTP; it increased the employees’ awareness, reduced the number of cyberattacks and optimized the available resources. The findings also highlighted the role of top management in the success of the implementation of the CTP. The results also ensure that the CTP’s maturity model affected the cybersecurity compliance of an organization and the implementation of cybersecurity policies and controls.

Practical implications

This study enhances cybersecurity researchers’ and practitioners’ understanding of the impact of the CTP and its components and evaluates its influence on Bahrain’s cybersecurity assurance.

Originality/value

This study implies that to achieve better cybersecurity, managers should focus on implementing the policies and controls provided by cybersecurity frameworks to enhance cybersecurity assurance.

Details

Information & Computer Security, vol. 31 no. 5
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 11 July 2023

João Henrique Lopes Guerra, Fernando Bernardi de Souza, Silvio Roberto Ignácio Pires and Anderson Luiz Ribeiro de Sá

Supply chains are among the most important, complex and risky systems in the modern world. Thus, managing risk is no longer an option, but a fundamental process in organizations…

Abstract

Purpose

Supply chains are among the most important, complex and risky systems in the modern world. Thus, managing risk is no longer an option, but a fundamental process in organizations. Given the lack of pathways that guide companies toward supply chain risk management (SCRM), the purpose of this study is to provide a conceptual reference, in the form of a maturity model, to support them in the evolution and improvement of this process.

Design/methodology/approach

The proposal covered a broad literature review, a survey and a multiple case study. The research was conducted in the aerospace industry and included companies from the supply chain of a leading aircraft manufacturer.

Findings

The model elaborated with the research results has eight attributes and four levels, addressing critical issues for SCRM to achieve its scope and purposes. The attributes include the structuring and scope of the SCRM process, the importance it receives within the organization, the resources used and the qualification of employees, the role of leadership and the inter-organizational collaboration.

Practical implications

Managing risk along supply chains is particularly challenging, demands resources and knowledge and requires a continuous effort. The proposed model offers a reference for improvement, helping to identify areas that need to be strengthened and practices to be implemented. Thus, it can guide the focus and efforts in a more efficient and systematic way, in addition to support evaluations and comparisons.

Originality/value

Although maturity models are abundant in different fields and several are available for risk management, models specifically developed for SCRM are scarce. This study broadens the understanding of SCRM with novel insights about how to improve this process in an evolutionary way. While many researchers focused their efforts on the SCRM process steps, this study identified critical issues that transcend these steps. The research was carried out in a sector with a long tradition in risk management and included companies belonging to a same supply chain, that is, using an approach still little explored in studies on SCRM or risk management maturity models.

Details

Supply Chain Management: An International Journal, vol. 29 no. 1
Type: Research Article
ISSN: 1359-8546

Keywords

Open Access
Article
Publication date: 27 July 2023

Andrea Kő, Gábor Tarján and Ariel Mitev

This paper aims to provide a maturity model for information security awareness (MMISA), based on the literature, expert interviews and feedback. In addition to developing the…

817

Abstract

Purpose

This paper aims to provide a maturity model for information security awareness (MMISA), based on the literature, expert interviews and feedback. In addition to developing the MMISA, the authors investigate the role of the three decisive factors that affect ISA maturity level: risk management mechanism, organizational structure and ISA.

Design/methodology/approach

The research methodology is a combined one; qualitative and quantitative methods were applied, including surveying the literature, interviews and developing a survey to collect quantitative data about decisive factors that affect ISA maturity level. The authors perform a variance-based partial least squares-structural equation modeling (PLS-SEM) investigation of the relationships between these factors.

Findings

The investigation of decisive factors of ISA maturity levels revealed that if the authors identify a strong risk assessment mechanism (through a documented methodology and reliable results), the authors can expect a high level of ISA. If there is a well-defined organizational structure with clear responsibilities, this supports the linking of a risk management mechanism with the level of ISA. The connection between organizational structure and ISA maturity level is supported by ISA activities: an increased level of awareness actions strengthens an organizational structure via the best practices learned by the staff.

Originality/value

The main contribution of the proposed MMISA model is that the model offers controls and audit evidence for maturity levels. Beyond that, the authors distinguish in the MMISA model controls supporting knowledge and controls supporting attitude, emphasizing that this is not enough to know what to do, but the proper attitude is required too. The authors didn't find any other ISA maturity model which has a similar feature. The contribution of the authors' work is that the authors provide a method for solving this complex measurement problem via the MMISA, which also offers direct guidance for the daily practices of organizations.

Details

Information Technology & People, vol. 36 no. 8
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 16 May 2023

Pinosh Kumar Hajoary, Amrita MA and Jose Arturo Garza-Reyes

Industry 4.0 has offered significant potential for manufacturing firms to alter and rethink their business models, production processes, strategies and objectives. Manufacturing…

Abstract

Purpose

Industry 4.0 has offered significant potential for manufacturing firms to alter and rethink their business models, production processes, strategies and objectives. Manufacturing organizations have recently undergone substantial transformation due to Industry 4.0 technologies. Hence, to successfully deploy and embed Industry 4.0 technologies in their organizational operations and practices, businesses must assess their adoption readiness. For this purpose, a multi-dimensional analytical indicator methodology has been developed to measure Industry 4.0 maturity and preparedness.

Design/methodology/approach

A weighted average method was adopted to assess the Industry 4.0 readiness using a case study from a steel manufacturing organization.

Findings

The result revealed that the firm ranks between Industry 2.0 and Industry 3.0, with an overall score of 2.32. This means that the organization is yet to achieve Industry 4.0 mature and ready organization.

Practical implications

The multi-dimensional indicator framework proposed can be used by managers, policymakers, practitioners and researchers to assess the current status of organizations in terms of Industry 4.0 maturity and readiness as well as undertake a practical diagnosis and prognosis of systems and processes for its future adoption.

Originality/value

Although research on Industry 4.0 maturity models has grown exponentially in recent years, this study is the first to develop a multi-dimensional analytical indicator to measure Industry 4.0 maturity and readiness.

Details

International Journal of Productivity and Performance Management, vol. 73 no. 4
Type: Research Article
ISSN: 1741-0401

Keywords

Open Access
Article
Publication date: 29 April 2024

Linda Salma Angreani, Annas Vijaya and Hendro Wicaksono

A maturity model for Industry 4.0 (I4.0 MM) with influencing factors is designed to address maturity issues in adopting Industry 4.0. Standardisation in I4.0 supports…

12

Abstract

Purpose

A maturity model for Industry 4.0 (I4.0 MM) with influencing factors is designed to address maturity issues in adopting Industry 4.0. Standardisation in I4.0 supports manufacturing industry transformation, forming reference architecture models (RAMs). This paper aligns key factors and maturity levels in I4.0 MMs with reputable I4.0 RAMs to enhance strategy for I4.0 transformation and implementation.

Design/methodology/approach

Three steps of alignment consist of the systematic literature review (SLR) method to study the current published high-quality I4.0 MMs, the taxonomy development of I4.0 influencing factors by adapting and implementing the categorisation of system theories and aligning I4.0 MMs with RAMs.

Findings

The study discovered that different I4.0 MMs lead to varied organisational interpretations. Challenges and insights arise when aligning I4.0 MMs with RAMs. Aligning MM levels with RAM stages is a crucial milestone in the journey toward I4.0 transformation. Evidence indicates that I4.0 MMs and RAMs often overlook the cultural domain.

Research limitations/implications

Findings contribute to the literature on aligning capabilities with implementation strategies while employing I4.0 MMs and RAMs. We use five RAMs (RAMI4.0, NIST-SME, IMSA, IVRA and IIRA), and as a common limitation in SLR, there could be a subjective bias in reading and selecting literature.

Practical implications

To fully leverage the capabilities of RAMs as part of the I4.0 implementation strategy, companies should initiate the process by undertaking a thorough needs assessment using I4.0 MMs.

Originality/value

The novelty of this paper lies in being the first to examine the alignment of I4.0 MMs with established RAMs. It offers valuable insights for improving I4.0 implementation strategies, especially for companies using both MMs and RAMs in their transformation efforts.

Details

Journal of Manufacturing Technology Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1741-038X

Keywords

Article
Publication date: 14 November 2023

Hajar Pouran Manjily, Mahmood Alborzi, Turaj Behrouz and Seyed Mohammad Seyed- Hosseini

This study aims to focused on conducting a comprehensive assessment of the technology readiness level (TRL) of Iran’s oil field intelligence compared to other countries with…

Abstract

Purpose

This study aims to focused on conducting a comprehensive assessment of the technology readiness level (TRL) of Iran’s oil field intelligence compared to other countries with similar oil reservoirs. The ultimate objective is to optimize oil extraction from this field by leveraging intelligent technology. Incorporating intelligent technology in oil fields can significantly simplify operations, especially in challenging-to-access areas and increase oil production, thereby generating higher income and profits for the field owner.

Design/methodology/approach

This study evaluates the level of maturity of present oil field technologies from the perspective of an intelligent oil field by using criteria for measuring the readiness of technologies. A questionnaire was designed and distributed to 18 competent oil industry professionals. Using weighted criteria, a mean estimate of oil field technical maturity was derived from the responses of respondents. Researchers evaluated the level of technological readiness for Brunei, Kuwait and Saudi Arabia’s oil fields using scientific studies.

Findings

None of the respondents believe that the intelligent oil field in Iran is highly developed and has a TRL 9 readiness level. The bulk of experts believed that intelligent technologies in the Iran oil industry have only reached TRL 2 and 1, or are merely in the transfer phase of fundamental and applied research. Clearly, Brunei, Kuwait and Saudi Arabia have the most developed oil fields in the world. In Iran, academics and executive and contracting firms in the field of intelligent oil fields are working to intelligently develop young oil fields.

Originality/value

This study explores the level of maturity of intelligent technology in one of Iran’s oil fields. It compares it to the level of maturity of intelligent technology in several other intelligent oil fields throughout the globe. Increasing intelligent oil fields TRL enables better reservoir management and causes more profit and oil recovery.

Details

Journal of Science and Technology Policy Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2053-4620

Keywords

Article
Publication date: 4 October 2021

Adeel Akmal, Nataliya Podgorodnichenko, Richard Greatbanks, Jeff Foote, Tim Stokes and Robin Gauld

The various quality improvement (QI) frameworks and maturity models described in the health services literature consider some aspects of QI while excluding others. This paper aims…

Abstract

Purpose

The various quality improvement (QI) frameworks and maturity models described in the health services literature consider some aspects of QI while excluding others. This paper aims to present a concerted attempt to create a quality improvement maturity model (QIMM) derived from holistic principles underlying the successful implementation of system-wide QI programmes.

Design/methodology/approach

A hybrid methodology involving a systematic review (Phase 1) of over 270 empirical research articles and books developed the basis for the proposed QIMM. It was followed by expert interviews to refine the core constructs and ground the proposed QIMM in contemporary QI practice (Phase 2). The experts included academics in two academic conferences and 59 QI managers from the New Zealand health-care system. In-depth interviews were conducted with QI managers to ascertain their views on the QIMM and its applicability in their respective health organisations (HOs).

Findings

The QIMM consists of four dimensions of organisational maturity, namely, strategic, process, supply chain and philosophical maturity. These dimensions progress through six stages, namely, identification, ad-hoc, formal, process-driven, optimised enterprise and finally a way of life. The application of the QIMM by the QI managers revealed that the scope of QI and the breadth of the principles adopted by the QI managers and their HOs in New Zealand is limited.

Practical implications

The importance of QI in health systems cannot be overstated. The proposed QIMM can help HOs diagnose their current state and provide a guide to action achieving a desirable state of quality improvement maturity. This QIMM avoids reliance on any single QI methodology. HOs – using the QIMM – should retain full control over the process of selecting any QI methodology or may even cherry-pick principles to suit their needs as long as they understand and appreciate the true nature and scope of quality overstated. The proposed QIMM can help HOs diagnose their current state and provide a guide to action achieving a desirable state of quality improvement maturity. This QIMM avoids reliance on any single QI methodology. HOs – using the QIMM – should retain full control over the process of selecting any QI methodology or may even cherry-pick principles to suit their needs as long as they understand and appreciate the true nature and scope of quality.

Originality/value

This paper contributes new knowledge by presenting a maturity model with an integrated set of quality principles for HOs and their extended supply networks.

Details

International Journal of Lean Six Sigma, vol. 15 no. 3
Type: Research Article
ISSN: 2040-4166

Keywords

Article
Publication date: 28 February 2023

Sara Rashidian, Robin Drogemuller, Sara Omrani and Fereshteh Banakar

The application of integrated project delivery (IPD) in conjunction with building information modeling (BIM) and Lean Construction (LC) as the efficient method for improving…

Abstract

Purpose

The application of integrated project delivery (IPD) in conjunction with building information modeling (BIM) and Lean Construction (LC) as the efficient method for improving collaboration and delivering construction projects has been acknowledged by construction academics and professionals. Once organizations have fully embraced BIM, IPD and LC integration, a measurement tool such as a maturity model (MM) for benchmarking their progress and setting realistic goals for continuous improvement will be required. In the context of MMs literature, however, no comprehensive analysis of these three construction management methods has been published to reveal the current trends and common themes in which the models have approached each other.

Design/methodology/approach

Therefore, this study integrates systematic literature review (SLR) and thematic analysis techniques to review and categorize the related MMs; the key themes in which the interrelationship between BIM, IPD and LC MMs has been discussed and conceptualized in the attributes; the shared characteristics of the existing BIM, IPD and LC MMs, as well as their strengths and limitations. The Preferred Reporting Items for Systematic Reviews (PRISMA) method has been used as the primary procedure for article screening and reviewing published papers between 2007 and 2022.

Findings

Despite the growth of BIM, IPD and LC integration publications and acknowledgment in the literature, no MM has been established that holistically measures BIM, IPD and LC integration in an organization. This study identifies five interrelated and overlapping themes indicative of the collaboration of BIM, IPD and LC in existing MMs' structure, including customer satisfaction, waste minimization, Lean practices and cultural and legal aspects. Furthermore, the MMs' common characteristics, strengths and limitations are evaluated to provide a foundation for developing future BIM, IPD and LC-related MMs.

Practical implications

This paper examines the current status of research and the knowledge gaps around BIM, IPD and LC MMs. In addition, the highlighted major themes serve as a foundation for academics who intend to develop integrated BIM, IPD, and LC MMs. This will enable researchers to build upon these themes and establish a comprehensive list of maturity attributes fulfilling the BIM, IPD and LC requirements and principles. In addition, the MMs' BIM, IPD and LC compatibility themes, which go beyond themes' intended characteristics in silos, increase industry practitioners' awareness of the underlying factors of BIM, IPD and LC integration.

Originality/value

This review article is the first of a kind to analyze the interaction of IPD, BIM and LC in the context of MMs in current AEC literature. This study concludes that BIM, IPD and LC share several joint cornerstones according to the existing MMs.

Details

Smart and Sustainable Built Environment, vol. 13 no. 3
Type: Research Article
ISSN: 2046-6099

Keywords

Open Access
Article
Publication date: 5 October 2023

Peter Dornheim and Ruediger Zarnekow

The human factor is the most important defense asset against cyberattacks. To ensure that the human factor stays strong, a cybersecurity culture must be established and cultivated…

1063

Abstract

Purpose

The human factor is the most important defense asset against cyberattacks. To ensure that the human factor stays strong, a cybersecurity culture must be established and cultivated in a company to guide the attitudes and behaviors of employees. Many cybersecurity culture frameworks exist; however, their practical application is difficult. This paper aims to demonstrate how an established framework can be applied to determine and improve the cybersecurity culture of a company.

Design/methodology/approach

Two surveys were conducted within eight months in the internal IT department of a global software company to analyze the cybersecurity culture and the applied improvement measures. Both surveys comprised the same 23 questions to measure cybersecurity culture according to six dimensions: cybersecurity accountability, cybersecurity commitment, cybersecurity necessity and importance, cybersecurity policy effectiveness, information usage perception and management buy-in.

Findings

Results demonstrate that cybersecurity culture maturity can be determined and improved if accurate measures are derived from the results of the survey. The first survey showed potential for improving the dimensions of cybersecurity accountability, cybersecurity commitment and cybersecurity policy effectiveness, while the second survey proved that these dimensions have been improved.

Originality/value

This paper proves that practical application of cybersecurity culture frameworks is possible if they are appropriately tailored to a given organization. In this regard, scientific research and practical application combine to offer real value to researchers and cybersecurity executives.

Details

Information & Computer Security, vol. 32 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

1 – 10 of over 1000