Search results

1 – 10 of 627
Book part
Publication date: 4 October 2024

Ayan Tyagi

This chapter examines the world of risk management within fintech. It initiates by emphasizing the crucial role of technology and risk assessment in shaping the fintech landscape…

Abstract

This chapter examines the world of risk management within fintech. It initiates by emphasizing the crucial role of technology and risk assessment in shaping the fintech landscape. It discusses various risk categories prevalent in fintech operations, elucidating the nuances of technology, operational, compliance, strategic, and reputational risks. A comparative analysis across different fintech sub-sectors unveils their distinct risk profiles. The narrative extends to proactive risk management frameworks, contrasting prominent models like the COSO ERM, FAIR Risk Quantification, and NIST Cybersecurity Frameworks. Integral defense measures are scrutinized, encompassing data encryption, access controls, vulnerability assessments, and incident response plans. This chapter underscores the significance of building operational resilience through robust technology infrastructure, regular system updates, disaster recovery planning, and business continuity measures. Ultimately, this chapter culminates in a comprehensive summary, offering pragmatic recommendations to fortify technology risk management in fintech.

Details

The Emerald Handbook of Fintech
Type: Book
ISBN: 978-1-83753-609-2

Keywords

Book part
Publication date: 4 October 2024

Maximiliano E. Korstanje

Specialists of all pundits and ideologies held the thesis that tourism safety and security is a cornerstone for the evolution and development of tourism. Tourists very well occupy…

Abstract

Specialists of all pundits and ideologies held the thesis that tourism safety and security is a cornerstone for the evolution and development of tourism. Tourists very well occupy a central position in the engineering of the tourist system. For decades, the discipline was influenced by what experts dubbed as the bubble model which means that tourists should be physically isolated from the interaction with local people. This happens because local people tend to attack or harm high-purchasing power tourists. Some studies have overtly alerted on the risks of enclave tourism for the local economy and society. At the end of the 20th century, this paradigm set the pace for other theories that focused mainly on terrorism, political violence, and local crime. Even Embassies report to their citizens alerting them on what are the safe and unsafe zones to be visited or avoided. Having said this, the literature is not contemplating a new global phenomenon mainly marked by homeless people and their contact with tourist zones. Some works allude to the term homeless tours to denote the complex relationships between foreign tourists, the local government, and homeless young people. This chapter fills the gap while discussing in depth this slippery matter.

Details

Of Tourists and Vagabonds in the Global South
Type: Book
ISBN: 978-1-83608-045-9

Keywords

Article
Publication date: 26 August 2024

Ali Vafaei-Zadeh, Davoud Nikbin, Jing Loo and Haniruzila Hanifah

This study aims to investigate the factors that influence the continuance intention to use personal cloud storage services among Generation Y.

Abstract

Purpose

This study aims to investigate the factors that influence the continuance intention to use personal cloud storage services among Generation Y.

Design/methodology/approach

A quantitative online survey was carried out to collect data from 271 respondents. Structural equation modelling with SmartPLS 4.0 software was used to run the analysis and examine the hypothesized relationships in the research model.

Findings

The study revealed that both satisfaction and habit exert a significant influence on continuance intention, whereas self-efficacy does not demonstrate a significant effect. In addition, satisfaction was found to be influenced by confirmation, perceived usefulness and perceived security. Furthermore, confirmation and cloud storage service quality were found to impact perceived usefulness, while confirmation also had an effect on perceived security. However, the hypothesized moderating role of perceived privacy risk in the relationship between perceived usefulness, perceived security and satisfaction was not supported.

Originality/value

This study advances the field by adapting an expanded expectation-confirmation model that delineates the nuanced impacts of habit, user satisfaction and self-efficacy on Generation Y’s continuance intention to use personal cloud storage services. It challenges the conventional wisdom regarding self-efficacy’s influence on technology adoption, offering a more intricate portrayal of its role. This research contributes a distinctive theoretical perspective, emphasizing the complex interplay of factors that inform sustained user engagement with cloud technologies.

Details

The Electronic Library , vol. 42 no. 5
Type: Research Article
ISSN: 0264-0473

Keywords

Open Access
Article
Publication date: 5 September 2024

Amer Jazairy, Mazen Brho, Ila Manuj and Thomas J. Goldsby

Despite the proliferation of cyberthreats upon the supply chain (SC) at large, knowledge on SC cybersecurity is scarce and predominantly conceptual or descriptive. Addressing this…

1154

Abstract

Purpose

Despite the proliferation of cyberthreats upon the supply chain (SC) at large, knowledge on SC cybersecurity is scarce and predominantly conceptual or descriptive. Addressing this gap, this research examines the effect of SC cyber risk management strategies on integration decisions for cybersecurity (with suppliers, customers, and internally) to enhance the SC’s cyber resilience and robustness.

Design/methodology/approach

A research model grounded in the supply chain risk management (SCRM) literature, with roots in the Dynamic Capabilities View and the Relational View, was developed. Survey responses of 388 SC managers at US manufacturers were obtained to test the model.

Findings

An impact of SC cyber risk management strategies on internal cyber integration was detected, which in turn impacted external cyber integration with both suppliers and customers. Further, a positive effect of internal and customer cyber integration on both cyber resilience and robustness was found, while cyber integration with suppliers impacted neither.

Practical implications

Industry practitioners may adapt certain risk management and integration strategies to enhance the cybersecurity posture of their SCs.

Originality/value

This research bridges between the established domain of SCRM and the emergent field of SC cybersecurity by forming and testing novel relationships between SCRM-rooted constructs tailored to an SC cyber risks context.

Details

International Journal of Physical Distribution & Logistics Management, vol. 54 no. 11
Type: Research Article
ISSN: 0960-0035

Keywords

Article
Publication date: 20 September 2024

Srikant Gupta and Pooja Singh Kushwaha

The purpose of our research on blockchain technology is to unveil its immense potential, understand its applications and implications and identify opportunities to revolutionize…

Abstract

Purpose

The purpose of our research on blockchain technology is to unveil its immense potential, understand its applications and implications and identify opportunities to revolutionize existing systems and processes. This research aims to inspire the creation of new innovative solutions for industries. By harnessing blockchain technology, organizations can pinpoint key areas that could significantly benefit from its use, such as streamlining operations, providing secure and transparent digital solutions and fortifying data security.

Design/methodology/approach

This study presents a robust multi-criteria decision-making framework for assessing blockchain drivers in selected Indian industries. We initiated with an extensive literature review to identify potential drivers. We then sought the opinions of experts in the field to validate and refine our list. This meticulous process led us to identify 26 drivers, which we categorized into five main categories. Finally, we employed the Best-Worst Method to determine the relative importance of each criterion, ensuring a comprehensive and reliable assessment.

Findings

The authors have ranked the blockchain drivers based on their degree of importance using the Best-Worst Method. This study reveals the priority of BC implementation, with the retail industry identified as the most in need, followed by the Banking and Healthcare industries. Various critical factors are identified where blockchain technology could help reduce costs, increase efficiency and enable new innovative business models.

Research limitations/implications

While this study acknowledges potential bias in driver assessment relying on literature and expert opinions, its findings carry significant practical implications. We have identified key areas where blockchain technology could be transformative by focusing on select industries. Future research should encompass other industries and real-world case studies for practical insights that could delve into the adoption challenges and benefits of blockchain technology in many other industries, thereby amplifying the relevance of our findings.

Originality/value

Blockchain is a groundbreaking, innovative technology with immense potential to revolutionize industries. Past research has explored the benefits and challenges of blockchain implementation in specific industries or sectors. This creates a gap in research regarding systematically classifying and ranking the importance of blockchain across different Indian industries. Our research seeks to address this gap by using advanced multi-criteria decision-making techniques. We aim to provide a comprehensive understanding of the significance of blockchain technology in critical Indian industries, offering valuable insights that can inform strategic decision-making and drive innovation in the country’s business landscape.

Details

International Journal of Productivity and Performance Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1741-0401

Keywords

Content available
Book part
Publication date: 4 October 2024

Maximiliano E. Korstanje

Abstract

Details

Of Tourists and Vagabonds in the Global South
Type: Book
ISBN: 978-1-83608-045-9

Article
Publication date: 24 September 2024

Zhipeng Liang, Chunju Zhao, Huawei Zhou, Yihong Zhou, Quan Liu, Tao Fang and Fang Wang

The spatial–temporal conflicts in the construction process of concrete arch dams are related to the construction quality and duration, especially for pouring blocks with a…

Abstract

Purpose

The spatial–temporal conflicts in the construction process of concrete arch dams are related to the construction quality and duration, especially for pouring blocks with a continuous high-strength and high-density construction process. Furthermore, the complicated construction technology and limited space resources aggravate the spatial–temporal conflicts in the process of space resource allocation and utilization, directly affecting the pouring quality and progress of concrete. To promote the high-strength, quality-preserving and rapid construction of dams and to clarify the explosion moment and influence degree of the spatial–temporal conflicts of construction machinery during the pouring process, a quantification method and algorithm for a “Conflict Bubble” (CB) between construction machines is proposed based on the “Time–Space Microelement” (TSM).

Design/methodology/approach

First, the concept of a CB is proposed, which is defined as the spatial overlap of different entities in the movement process. The subsidiary space of the entity is divided into three layered spaces: the physical space, safe space and efficiency space from the inside to the outside. Second, the processes of “creation,” “transition” and “disappearance” of the CB at different levels with the movement of the entity are defined as the evolution of the spatial–temporal state of the entity. The mapping relationship between the spatial variation and the running time of the layered space during the movement process is defined as “Time–Space” (TS), which is intended to be processed by a microelement.

Findings

The quantification method and algorithm of the CB between construction machinery are proposed based on the TSM, which realizes the quantification of the physical collision accident rate, security risk rate and efficiency loss rate of the construction machinery at any time point or time period. The risk rate of spatial–temporal conflicts in the construction process was calculated, and the outbreak condition of spatial–temporal conflict in the pouring process was simulated and rehearsed. The quantitative calculation results show that the physical collision accident rate, security risk rate and efficiency loss rate of construction machinery at any time point or time period can be quantified.

Originality/value

This study provides theoretical support for the quantitative evaluation and analysis of the spatial–temporal conflict risk in the pouring construction process. It also serves as a reference for the rational organization and scientific decision-making for pouring blocks and provides new ideas and methods for the safe and efficient construction and the scientific and refined management of dams.

Details

Engineering Computations, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0264-4401

Keywords

Open Access
Article
Publication date: 25 June 2024

Michael Herburger, Andreas Wieland and Carina Hochstrasser

Disruptive events caused by cyber incidents, such as supply chain (SC) cyber incidents, can affect firms’ SC operations on a large scale, causing disruptions in material…

1338

Abstract

Purpose

Disruptive events caused by cyber incidents, such as supply chain (SC) cyber incidents, can affect firms’ SC operations on a large scale, causing disruptions in material, information and financial flows and impacting the availability, integrity and confidentiality of SC assets. While SC resilience (SCRES) research has received much attention in recent years, the purpose of this study is to investigate specific capabilities for building SCRES to cyber risks. Based on a nuanced understanding of SC cyber risk characteristics, this study explores how to build SC cyber resilience (SCCR) using the perspective of dynamic capability (DC) theory.

Design/methodology/approach

Based on 79 in-depth interviews, this qualitative study examines 28 firms representing 4 SCs in Central Europe. The researchers interpret data from semistructured interviews and secondary data using the DC perspective, which covers sensing, seizing and transforming.

Findings

The authors identify SCRES capabilities, in general, and SCCR-specific capabilities that form the basis for the realignment of DCs for addressing cyber risks in SCs. The authors argue that SCRES capabilities should, in general, be combined with specific capabilities for SCCR to deal with SC cyber risks. Based on these findings, 10 propositions for future research are provided.

Practical implications

Practitioners should collaborate specifically to address cyber threats and risks in SCs, integrate new SC partners and use new approaches. Furthermore, this study shows that cyber risks need to be treated differently from traditional SC risks.

Originality/value

This empirical study enriches the SC management literature by examining SCRES to cyber risks through the insightful lens of DCs. It identifies DCs for building SCCR, makes several managerial contributions and is among the few that apply the DC approach to address specific SC risks.

Details

Supply Chain Management: An International Journal, vol. 29 no. 7
Type: Research Article
ISSN: 1359-8546

Keywords

Article
Publication date: 31 May 2024

Amidu Kalokoh

This paper aims to examine the association between money laundering (ML)/terrorist financing (TF) risks (hereafter, money laundering risks) and democratic governance across 117…

Abstract

Purpose

This paper aims to examine the association between money laundering (ML)/terrorist financing (TF) risks (hereafter, money laundering risks) and democratic governance across 117 countries.

Design/methodology/approach

A cross-sectional design was used to examine the association between ML risks and democratic governance by a quantitative approach. The findings are based on annual ratings of 117 countries on ML/TF risks and democracy while controlling for criminality and peace. The data was compiled from the Basel Anti-Money Laundering/Countering Financing Terrorism Risks Index, the Economic Intelligence Unit (Democracy Index), the Global Initiative against Transnational Organized Crimes (Criminality Index) and the Institute for Economics and Peace Index for 2020.

Findings

A multiple linear regression model found a statistically significant negative association between democratic governance and ML risks (B = −0.354, t = −7.454, p = <0.001) and a significant positive association between criminality and ML risks (B = 0.242, t = 2.692, p = 0.008).

Research limitations/implications

A cross-sectional design cannot determine causal inferences and generalization (Levin, 2006). The study only used a year to examine the hypothesis of a negative correlation between ML risks and democratic governance, thus making generalization difficult.

Originality/value

Extant literature examined ML, terrorism and AML diversely. There was a need to estimate the association between ML risks and democratic governance, especially globally, during a global crisis like COVID-19, when democratic principles, such as the rule of law, transparency and accountability, are challenged. Many personnel were laid off, thus limiting supervision for ML and TF. This study presents evidence of this association.

Details

Journal of Money Laundering Control, vol. 27 no. 5
Type: Research Article
ISSN: 1368-5201

Keywords

Content available
Book part
Publication date: 4 October 2024

Abstract

Details

The Emerald Handbook of Fintech
Type: Book
ISBN: 978-1-83753-609-2

1 – 10 of 627