Search results
1 – 10 of 627This chapter examines the world of risk management within fintech. It initiates by emphasizing the crucial role of technology and risk assessment in shaping the fintech landscape…
Abstract
This chapter examines the world of risk management within fintech. It initiates by emphasizing the crucial role of technology and risk assessment in shaping the fintech landscape. It discusses various risk categories prevalent in fintech operations, elucidating the nuances of technology, operational, compliance, strategic, and reputational risks. A comparative analysis across different fintech sub-sectors unveils their distinct risk profiles. The narrative extends to proactive risk management frameworks, contrasting prominent models like the COSO ERM, FAIR Risk Quantification, and NIST Cybersecurity Frameworks. Integral defense measures are scrutinized, encompassing data encryption, access controls, vulnerability assessments, and incident response plans. This chapter underscores the significance of building operational resilience through robust technology infrastructure, regular system updates, disaster recovery planning, and business continuity measures. Ultimately, this chapter culminates in a comprehensive summary, offering pragmatic recommendations to fortify technology risk management in fintech.
Details
Keywords
Specialists of all pundits and ideologies held the thesis that tourism safety and security is a cornerstone for the evolution and development of tourism. Tourists very well occupy…
Abstract
Specialists of all pundits and ideologies held the thesis that tourism safety and security is a cornerstone for the evolution and development of tourism. Tourists very well occupy a central position in the engineering of the tourist system. For decades, the discipline was influenced by what experts dubbed as the bubble model which means that tourists should be physically isolated from the interaction with local people. This happens because local people tend to attack or harm high-purchasing power tourists. Some studies have overtly alerted on the risks of enclave tourism for the local economy and society. At the end of the 20th century, this paradigm set the pace for other theories that focused mainly on terrorism, political violence, and local crime. Even Embassies report to their citizens alerting them on what are the safe and unsafe zones to be visited or avoided. Having said this, the literature is not contemplating a new global phenomenon mainly marked by homeless people and their contact with tourist zones. Some works allude to the term homeless tours to denote the complex relationships between foreign tourists, the local government, and homeless young people. This chapter fills the gap while discussing in depth this slippery matter.
Details
Keywords
Ali Vafaei-Zadeh, Davoud Nikbin, Jing Loo and Haniruzila Hanifah
This study aims to investigate the factors that influence the continuance intention to use personal cloud storage services among Generation Y.
Abstract
Purpose
This study aims to investigate the factors that influence the continuance intention to use personal cloud storage services among Generation Y.
Design/methodology/approach
A quantitative online survey was carried out to collect data from 271 respondents. Structural equation modelling with SmartPLS 4.0 software was used to run the analysis and examine the hypothesized relationships in the research model.
Findings
The study revealed that both satisfaction and habit exert a significant influence on continuance intention, whereas self-efficacy does not demonstrate a significant effect. In addition, satisfaction was found to be influenced by confirmation, perceived usefulness and perceived security. Furthermore, confirmation and cloud storage service quality were found to impact perceived usefulness, while confirmation also had an effect on perceived security. However, the hypothesized moderating role of perceived privacy risk in the relationship between perceived usefulness, perceived security and satisfaction was not supported.
Originality/value
This study advances the field by adapting an expanded expectation-confirmation model that delineates the nuanced impacts of habit, user satisfaction and self-efficacy on Generation Y’s continuance intention to use personal cloud storage services. It challenges the conventional wisdom regarding self-efficacy’s influence on technology adoption, offering a more intricate portrayal of its role. This research contributes a distinctive theoretical perspective, emphasizing the complex interplay of factors that inform sustained user engagement with cloud technologies.
Details
Keywords
Amer Jazairy, Mazen Brho, Ila Manuj and Thomas J. Goldsby
Despite the proliferation of cyberthreats upon the supply chain (SC) at large, knowledge on SC cybersecurity is scarce and predominantly conceptual or descriptive. Addressing this…
Abstract
Purpose
Despite the proliferation of cyberthreats upon the supply chain (SC) at large, knowledge on SC cybersecurity is scarce and predominantly conceptual or descriptive. Addressing this gap, this research examines the effect of SC cyber risk management strategies on integration decisions for cybersecurity (with suppliers, customers, and internally) to enhance the SC’s cyber resilience and robustness.
Design/methodology/approach
A research model grounded in the supply chain risk management (SCRM) literature, with roots in the Dynamic Capabilities View and the Relational View, was developed. Survey responses of 388 SC managers at US manufacturers were obtained to test the model.
Findings
An impact of SC cyber risk management strategies on internal cyber integration was detected, which in turn impacted external cyber integration with both suppliers and customers. Further, a positive effect of internal and customer cyber integration on both cyber resilience and robustness was found, while cyber integration with suppliers impacted neither.
Practical implications
Industry practitioners may adapt certain risk management and integration strategies to enhance the cybersecurity posture of their SCs.
Originality/value
This research bridges between the established domain of SCRM and the emergent field of SC cybersecurity by forming and testing novel relationships between SCRM-rooted constructs tailored to an SC cyber risks context.
Details
Keywords
Srikant Gupta and Pooja Singh Kushwaha
The purpose of our research on blockchain technology is to unveil its immense potential, understand its applications and implications and identify opportunities to revolutionize…
Abstract
Purpose
The purpose of our research on blockchain technology is to unveil its immense potential, understand its applications and implications and identify opportunities to revolutionize existing systems and processes. This research aims to inspire the creation of new innovative solutions for industries. By harnessing blockchain technology, organizations can pinpoint key areas that could significantly benefit from its use, such as streamlining operations, providing secure and transparent digital solutions and fortifying data security.
Design/methodology/approach
This study presents a robust multi-criteria decision-making framework for assessing blockchain drivers in selected Indian industries. We initiated with an extensive literature review to identify potential drivers. We then sought the opinions of experts in the field to validate and refine our list. This meticulous process led us to identify 26 drivers, which we categorized into five main categories. Finally, we employed the Best-Worst Method to determine the relative importance of each criterion, ensuring a comprehensive and reliable assessment.
Findings
The authors have ranked the blockchain drivers based on their degree of importance using the Best-Worst Method. This study reveals the priority of BC implementation, with the retail industry identified as the most in need, followed by the Banking and Healthcare industries. Various critical factors are identified where blockchain technology could help reduce costs, increase efficiency and enable new innovative business models.
Research limitations/implications
While this study acknowledges potential bias in driver assessment relying on literature and expert opinions, its findings carry significant practical implications. We have identified key areas where blockchain technology could be transformative by focusing on select industries. Future research should encompass other industries and real-world case studies for practical insights that could delve into the adoption challenges and benefits of blockchain technology in many other industries, thereby amplifying the relevance of our findings.
Originality/value
Blockchain is a groundbreaking, innovative technology with immense potential to revolutionize industries. Past research has explored the benefits and challenges of blockchain implementation in specific industries or sectors. This creates a gap in research regarding systematically classifying and ranking the importance of blockchain across different Indian industries. Our research seeks to address this gap by using advanced multi-criteria decision-making techniques. We aim to provide a comprehensive understanding of the significance of blockchain technology in critical Indian industries, offering valuable insights that can inform strategic decision-making and drive innovation in the country’s business landscape.
Details
Keywords
Zhipeng Liang, Chunju Zhao, Huawei Zhou, Yihong Zhou, Quan Liu, Tao Fang and Fang Wang
The spatial–temporal conflicts in the construction process of concrete arch dams are related to the construction quality and duration, especially for pouring blocks with a…
Abstract
Purpose
The spatial–temporal conflicts in the construction process of concrete arch dams are related to the construction quality and duration, especially for pouring blocks with a continuous high-strength and high-density construction process. Furthermore, the complicated construction technology and limited space resources aggravate the spatial–temporal conflicts in the process of space resource allocation and utilization, directly affecting the pouring quality and progress of concrete. To promote the high-strength, quality-preserving and rapid construction of dams and to clarify the explosion moment and influence degree of the spatial–temporal conflicts of construction machinery during the pouring process, a quantification method and algorithm for a “Conflict Bubble” (CB) between construction machines is proposed based on the “Time–Space Microelement” (TSM).
Design/methodology/approach
First, the concept of a CB is proposed, which is defined as the spatial overlap of different entities in the movement process. The subsidiary space of the entity is divided into three layered spaces: the physical space, safe space and efficiency space from the inside to the outside. Second, the processes of “creation,” “transition” and “disappearance” of the CB at different levels with the movement of the entity are defined as the evolution of the spatial–temporal state of the entity. The mapping relationship between the spatial variation and the running time of the layered space during the movement process is defined as “Time–Space” (TS), which is intended to be processed by a microelement.
Findings
The quantification method and algorithm of the CB between construction machinery are proposed based on the TSM, which realizes the quantification of the physical collision accident rate, security risk rate and efficiency loss rate of the construction machinery at any time point or time period. The risk rate of spatial–temporal conflicts in the construction process was calculated, and the outbreak condition of spatial–temporal conflict in the pouring process was simulated and rehearsed. The quantitative calculation results show that the physical collision accident rate, security risk rate and efficiency loss rate of construction machinery at any time point or time period can be quantified.
Originality/value
This study provides theoretical support for the quantitative evaluation and analysis of the spatial–temporal conflict risk in the pouring construction process. It also serves as a reference for the rational organization and scientific decision-making for pouring blocks and provides new ideas and methods for the safe and efficient construction and the scientific and refined management of dams.
Details
Keywords
Michael Herburger, Andreas Wieland and Carina Hochstrasser
Disruptive events caused by cyber incidents, such as supply chain (SC) cyber incidents, can affect firms’ SC operations on a large scale, causing disruptions in material…
Abstract
Purpose
Disruptive events caused by cyber incidents, such as supply chain (SC) cyber incidents, can affect firms’ SC operations on a large scale, causing disruptions in material, information and financial flows and impacting the availability, integrity and confidentiality of SC assets. While SC resilience (SCRES) research has received much attention in recent years, the purpose of this study is to investigate specific capabilities for building SCRES to cyber risks. Based on a nuanced understanding of SC cyber risk characteristics, this study explores how to build SC cyber resilience (SCCR) using the perspective of dynamic capability (DC) theory.
Design/methodology/approach
Based on 79 in-depth interviews, this qualitative study examines 28 firms representing 4 SCs in Central Europe. The researchers interpret data from semistructured interviews and secondary data using the DC perspective, which covers sensing, seizing and transforming.
Findings
The authors identify SCRES capabilities, in general, and SCCR-specific capabilities that form the basis for the realignment of DCs for addressing cyber risks in SCs. The authors argue that SCRES capabilities should, in general, be combined with specific capabilities for SCCR to deal with SC cyber risks. Based on these findings, 10 propositions for future research are provided.
Practical implications
Practitioners should collaborate specifically to address cyber threats and risks in SCs, integrate new SC partners and use new approaches. Furthermore, this study shows that cyber risks need to be treated differently from traditional SC risks.
Originality/value
This empirical study enriches the SC management literature by examining SCRES to cyber risks through the insightful lens of DCs. It identifies DCs for building SCCR, makes several managerial contributions and is among the few that apply the DC approach to address specific SC risks.
Details
Keywords
This paper aims to examine the association between money laundering (ML)/terrorist financing (TF) risks (hereafter, money laundering risks) and democratic governance across 117…
Abstract
Purpose
This paper aims to examine the association between money laundering (ML)/terrorist financing (TF) risks (hereafter, money laundering risks) and democratic governance across 117 countries.
Design/methodology/approach
A cross-sectional design was used to examine the association between ML risks and democratic governance by a quantitative approach. The findings are based on annual ratings of 117 countries on ML/TF risks and democracy while controlling for criminality and peace. The data was compiled from the Basel Anti-Money Laundering/Countering Financing Terrorism Risks Index, the Economic Intelligence Unit (Democracy Index), the Global Initiative against Transnational Organized Crimes (Criminality Index) and the Institute for Economics and Peace Index for 2020.
Findings
A multiple linear regression model found a statistically significant negative association between democratic governance and ML risks (B = −0.354, t = −7.454, p = <0.001) and a significant positive association between criminality and ML risks (B = 0.242, t = 2.692, p = 0.008).
Research limitations/implications
A cross-sectional design cannot determine causal inferences and generalization (Levin, 2006). The study only used a year to examine the hypothesis of a negative correlation between ML risks and democratic governance, thus making generalization difficult.
Originality/value
Extant literature examined ML, terrorism and AML diversely. There was a need to estimate the association between ML risks and democratic governance, especially globally, during a global crisis like COVID-19, when democratic principles, such as the rule of law, transparency and accountability, are challenged. Many personnel were laid off, thus limiting supervision for ML and TF. This study presents evidence of this association.
Details