Search results

1 – 10 of over 9000
Article
Publication date: 13 December 2022

Anisha Banu Dawood Gani, Yudi Fernando, Shulin Lan, Ming K. Lim and Ming-Lang Tseng

This study aims to examine whether the cyber supply chain risk management (CSCRM) practices adopted by manufacturing firms contribute to achieving cyber supply chain (CSC…

Abstract

Purpose

This study aims to examine whether the cyber supply chain risk management (CSCRM) practices adopted by manufacturing firms contribute to achieving cyber supply chain (CSC) visibility. Studies have highlighted the necessity of having visibility across interconnected supply chains. Thus, this study examines the extent of CSCRM practices enabling CSC visibility to act as a mediator in achieving CSC performance.

Design/methodology/approach

A survey method was used to obtain data from the electrical and electronics manufacturing firms registered with the Federations of Malaysian Manufacturers directory. Data from 130 respondents were analysed using IBM SPSS and PLS-SEM.

Findings

This study empirically proves a dedicated governance team's integral role in setting the security tone within its CSC. The result also confirms the significant role that CSC visibility plays in achieving CSC performance. As theorised in the literature, there is also a strong direct relationship between CSC visibility and CSC performance, assuring manufacturing firms that investments and policies devised to improve CSC visibility are fruitful.

Originality/value

The significance of supply chain visibility in an integrated supply chain is recognised and studied using analytical models, behavioural techniques and case studies. Substantial empirical evidence on the CSCRM practices which contributes towards achieving supply chain visibility is still elusive. This study's major contribution lies in identifying CSCRM practices that can contribute towards achieving CSC visibility, and the mediating role CSC visibility plays in achieving CSC performance.

Details

Industrial Management & Data Systems, vol. 123 no. 3
Type: Research Article
ISSN: 0263-5577

Keywords

Article
Publication date: 13 February 2017

Inho Hwang, Daejin Kim, Taeha Kim and Sanghyun Kim

The purpose of this paper is to empirically investigate the negative casual relationships between organizational security factors (security systems, security education, and…

2407

Abstract

Purpose

The purpose of this paper is to empirically investigate the negative casual relationships between organizational security factors (security systems, security education, and security visibility) and individual non-compliance causes (work impediment, security system anxiety, and non-compliance behaviors of peers), which have negative influences on compliance intention.

Design/methodology/approach

Based on literature review, the authors propose a research model together with hypotheses. The survey questionnaires were developed to collect data, which then validated the measurement model. The authors collected 415 responses from employees at manufacturing and service firms that had already implemented security policies. The hypothesized relationships were tested using the structural equation model approach with AMOS 18.0.

Findings

Survey results validate that work impediment, security system anxiety, and non-compliance peer behaviors are the causes of employee non-compliance. In addition, the authors found that security systems, security education, and security visibility decrease instances of non-compliance.

Research limitations/implications

Organizations should establish a mixture of security investment in their systems, education, and visibility in order to effectively reduce employees’ non-compliance. In addition, organizations should recognize the importance of minimizing the particular causes of employees’ non-compliance to positively increase intentions to comply with information security.

Originality/value

An important issue in information security management is employee compliance. Understanding the reasons behind employees’ non-compliance is a critical issue. This paper investigates empirically why employees do not comply, and how organizations can induce employees to comply by a mixture of investments in security systems, education, and visibility.

Details

Online Information Review, vol. 41 no. 1
Type: Research Article
ISSN: 1468-4527

Keywords

Article
Publication date: 12 June 2019

Daniel Pérez-González, Sara Trigueros Preciado and Pedro Solana-Gonzalez

The purpose of this paper is to expand current knowledge about the security organizational practices and analyze its effects on the information security management performance.

1003

Abstract

Purpose

The purpose of this paper is to expand current knowledge about the security organizational practices and analyze its effects on the information security management performance.

Design/methodology/approach

Based on the literature review, the authors propose a research model together with hypotheses. The survey questionnaires were developed to collect data, which then validated the measurement model. The authors collected 111 responses from CEOs at manufacturing small- and medium-sized enterprises (SMEs) that had already implemented security policies. The hypothesized relationships were tested using the structural equation model approach with EQS 6.1 software.

Findings

Results validate that information security knowledge sharing, information security education and information security visibility, as well as security organizational practices, have a positive effect on the information security management performance.

Research limitations/implications

The consideration of organizational aspects of information security should be taken into account by academics, practitioners and policymakers in SMEs. Besides, the work helps validate novel constructs used in recent research (information security knowledge sharing and information security visibility).

Practical implications

The authors extend previous works by analyzing how security organizational practices affect the performance of information security. The results suggest that an improved performance of information security in the industrial SMEs requires innovative practices to foster knowledge sharing among employees.

Originality/value

The literature recognizes the need to develop empirical research on information security focused on SMEs. Besides the need to identify organizational practices that improve information security, this paper empirically investigates SMEs’ organizational practices in the security of information and analyzes its effects on the performance of information security.

Article
Publication date: 12 February 2018

Ali Vafaei-Zadeh, Thurasamy Ramayah, Wai Peng Wong and Haniruzila Md Hanifah

The aim of this research is to analyse the impact of relative advantage, compatibility, ease of use, visibility, voluntariness, image, result demonstrability and trialability on…

Abstract

Purpose

The aim of this research is to analyse the impact of relative advantage, compatibility, ease of use, visibility, voluntariness, image, result demonstrability and trialability on intention to use internet security software using a model developed based on perceived characteristics of innovation by Moore and Benbasat (1991) among undergraduate students.

Design/methodology/approach

Using an intercept survey method, 425 responses were collected from a Malaysian public university using a closed questionnaire which was gotten from the literature. The authors used the SmartPLS software which is a second-generation structural equation modelling software that can be used to model latent variables with negligible requirements.

Findings

The results show that relative advantage, compatibility, visibility, voluntariness, result demonstrability and trialability had a positive effect on use of internet security software while ease of use and image was not significant.

Research limitations/implications

The most important predictor was trialability which sends a clear signal to software developers that users would like to be able to try the software before making a decision to purchase and use. However, the research is limited to students only. Therefore, future research can be extended to wider population.

Practical implications

The result of this paper provides beneficial information to the internet security software developers about what factors affect users’ intentions to buy their products.

Originality/value

The authors used the comprehensive innovation diffusion theory to test the security behaviour of under graduate students from a developing country’s perspectives. Many other similar studies have been done in the developed country’s context. Thus, this paper adds to the literature from a developing country’s perspective.

Details

VINE Journal of Information and Knowledge Management Systems, vol. 48 no. 1
Type: Research Article
ISSN: 2059-5891

Keywords

Article
Publication date: 22 June 2022

Nilaya Murthy and Santosh Gopalkrishnan

The purpose of this study is to find out if there is a sequence or pattern to digital frauds and whether the openness quotient of any individual has a meaningful role to play in…

Abstract

Purpose

The purpose of this study is to find out if there is a sequence or pattern to digital frauds and whether the openness quotient of any individual has a meaningful role to play in them becoming victims of digital frauds. The legal and regulatory angle of digital frauds and relief measures for social media openness and frauds are discussed to examine the connection between openness, identity data, visibility, vulnerability, digital frauds and social media sharing of information.

Design/methodology/approach

This study is empirical and investigative research. Primary data was collected via questionnaires circulated among participants from various age groups to understand the implications of different demographic factors such as age, websites used, profiles created and data shared on the internet, social media and e-commerce websites.

Findings

The results exhibit that the openness factor does affect vulnerability and has an influence on the risk and legal component of inclination towards digital frauds.

Practical implications

This research study results in bridging the gap by increasing the level of understanding and awareness in users toward achieving proactive and regulated behaviour and comprehending the violation of various acts of digital frauds and its implications, especially in the Indian banking sector.

Originality/value

This study will be beneficial to all individuals alike in understanding the implications of excessive openness toward digital platforms and evaluating generic and legal solutions to avoid becoming victims of digital fraud.

Details

International Journal of Law and Management, vol. 64 no. 4
Type: Research Article
ISSN: 1754-243X

Keywords

Article
Publication date: 3 April 2024

Mike Brookbanks and Glenn C. Parry

This study aims to examine the effect of Industry 4.0 technology on resilience in established cross-border supply chain(s) (SC).

Abstract

Purpose

This study aims to examine the effect of Industry 4.0 technology on resilience in established cross-border supply chain(s) (SC).

Design/methodology/approach

A literature review provides insight into the resilience capabilities of cross-border SC. The research uses a case study of operational international SC: the producers, importers, logistics companies and UK Government (UKG) departments. Semi-structured interviews determine the resilience capabilities and approaches of participants within cross-border SC and how implementing an Industry 4.0 Internet of Things (IoT) and capitals Distributed Ledger (blockchain) based technology platform changes SC resilience capabilities and approaches.

Findings

A blockchain-based platform introduces common assured data, reducing data duplication. When combined with IoT technology, the platform improves end-to-end SC visibility and information sharing. Industry 4.0 technology builds collaboration, trust, improved agility, adaptability and integration. It enables common resilience capabilities and approaches that reduce the de-coupling between government agencies and participants of cross-border SC.

Research limitations/implications

The case study presents challenges specific to UKG’s customs border operations; research needs to be repeated in different contexts to confirm findings are generalisable.

Practical implications

Operational SC and UKG customs and excise departments must align their resilience strategies to gain full advantage of Industry 4.0 technologies.

Originality/value

Case study research shows how Industry 4.0 technology reduces the de-coupling between the SC and UKG, enhancing common resilience capabilities within established cross-border operations. Improved information sharing and SC visibility provided by IoT and blockchain technologies support the development of resilience in established cross-border SC and enhance interactions with UKG at the customs border.

Details

Supply Chain Management: An International Journal, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1359-8546

Keywords

Article
Publication date: 14 February 2023

IpKin Anthony Wong, Keng Fong Chau and Heng U. Chan

This study aims to synthesize a research model based on artificial intelligence (AI) applications in the casino setting. The model incorporates the technology acceptance model…

Abstract

Purpose

This study aims to synthesize a research model based on artificial intelligence (AI) applications in the casino setting. The model incorporates the technology acceptance model (TAM) along with three external drivers, including factors pertinent to personal traits (i.e. openness), AI technology (i.e. visibility, security and social influence) and context (i.e. monetary motivation).

Design/methodology/approach

An empirical study was conducted with 354 casino patrons. Partial least squares-structural equation modeling was used to test the proposed relationships.

Findings

The results reveal that openness, security and monetary motivation are significant antecedents of perceived usefulness. Visibility and social influence have significant direct effects on the intention to gamble in AI-supported casinos.

Originality/value

This study reinvestigates the TAM model from the casino customers’ AI decision support perspective to illustrate both the direct and mediating effects of perceived usefulness and ease of use on such a system. It highlights the salience of social influence, personality traits and monetary motivation on the propensity to adopt AI. It also contributes to the casino literature by showcasing the role of technology in directing patrons’ decisions.

研究目的

本研究综合了一项基于人工智能在赌场环境中应用的研究模型。该模型结合了技术接受模型 (TAM) 以及三个外部驱动因素, 包括与个人特征(即开放性)、人工智能技术(即可见性、安全性和社会影响力)和背景(即金钱动机)相关的因素.

研究设计/方法/途径

对 354 名赌场顾客进行了实证研究。 PLS-SEM 用于测试提出的关系。

研究结果

结果表明, 开放性、安全性和金钱动机是感知有用性的重要前提。知名度和社会影响力对在人工智能支持的赌场赌博的意图有显着的直接影响。

研究原创性/价值

本研究从赌场客户的 AI 决策支持角度重新研究 TAM 模型, 以说明感知有用性和易用性对此类系统的直接和中介影响。它强调了社会影响、个性特征和金钱动机对采用人工智能的倾向的重要性。它还通过展示技术在指导顾客决策中的作用为赌场文献做出了贡献。

Details

Journal of Hospitality and Tourism Technology, vol. 14 no. 2
Type: Research Article
ISSN: 1757-9880

Keywords

Article
Publication date: 4 February 2022

Vimal K.E.K., Simon Peter Nadeem, Siddharth Meledathu Sunil, Gokul Suresh, Navaneeth Sanjeev and Jayakrishna Kandasamy

Improving the medical oxygen supply chain (MOSC) is important to cope with the uneven demand and supply seen in the MOSC when India faced the second wave of COVID-19. This…

Abstract

Purpose

Improving the medical oxygen supply chain (MOSC) is important to cope with the uneven demand and supply seen in the MOSC when India faced the second wave of COVID-19. This improvisation increases the supply chain (SC) maturity and consequently the efficiency and resiliency to tackle oxygen shortage across the country and to prevent another similar scenario from ever happening. The purpose of this study is to identify and prioritize the solutions to overcome the issues faced by the MOSC during the second wave of COVID-19 cases in India and in turn reduce the extent of casualties in the expected third wave.

Design/methodology/approach

This paper uses best worst method (BWM) and fuzzy technique for order performance by similarity to ideal solution to classify the sub-criteria for solutions to solve major SC issues. BWM is used to determine the weights of the sub-criteria and fuzzy technique for order performance by similarity to ideal solution for the final ranking of the solutions to be adopted.

Findings

The result of this study shows that the Internet of Things based tagging system is the best solution followed by horizontal and vertical integration of SC in making a resilient and digitized MOSC capable of handling general bottlenecks during a possible third wave.

Research limitations/implications

The research provides insights that can enable the personnel involved in MOSC. Proper understanding will help the practitioners involved in the SC to effectively tailor the operations and to allocate the resources available in an effective and dynamic manner by minimizing or eliminating the pre-existing bottlenecks within the SC.

Originality/value

The proposed framework provides an accurate ranking and decision-making tool for the implementation of the solutions for the maturity of the MOSC.

Article
Publication date: 14 August 2020

Shiran Geng, Hing-Wah Chau, Se Yan, Wenyu Zhang and Chunyang Zhang

Spatial arrangement of hospital environments has been proven to have impacts on hospital users such as wayfinding, privacy and operational efficiency. Many studies examined the…

Abstract

Purpose

Spatial arrangement of hospital environments has been proven to have impacts on hospital users such as wayfinding, privacy and operational efficiency. Many studies examined the spatial quality of hospitals, but there is a lack of comparative research between Chinese and Australian hospitals. Hospitals in both countries have salient features that are worth to learn and can inform hospital stakeholders internationally on design decisions. The purpose of this paper is to evaluate and compare the spatial quality of hospitals from both countries using space syntax approach and field observation.

Design/methodology/approach

This study uses space syntax analysis and observation to provide qualitative and quantitative data. Illustrative case studies from both countries are selected for comparison. The main benchmarks involved in measuring the spatial qualities, such as step depth and visual connectivity, are analysed using Depthmap X before comparing with the results from observation.

Findings

For Chinese hospitals to be more human-centred, public space design and facility management need additional attention. Australian hospitals could learn from Hospital D on how to design highly centralised nursing stations that cope with a high patient flow. Global policy and decision-makers should consider the potential inconsistency between initial design intention and practical use.

Originality/value

Practical implications were made based on the results for bettering hospital environments. It is hoped that the methodology presented in this research is of significance to the enhancement of global healthcare environment research.

Details

International Journal of Building Pathology and Adaptation, vol. 39 no. 3
Type: Research Article
ISSN: 2398-4708

Keywords

Article
Publication date: 12 February 2019

Maciel M. Queiroz, Renato Telles and Silvia H. Bonilla

This paper aims to identify, analyse and organise the literature about blockchains in supply chain management (SCM) context (blockchain–SCM integration) and proposes an agenda for…

19335

Abstract

Purpose

This paper aims to identify, analyse and organise the literature about blockchains in supply chain management (SCM) context (blockchain–SCM integration) and proposes an agenda for future research. This study aims to shed light on what the main current blockchain applications in SCM are, what the main disruptions and challenges are in SCM because of blockchain adoption and what the future of blockchains holds in SCM.

Design/methodology/approach

This study followed the systematic review approach to analyse and synthesise the extant literature on blockchain–SCM integration. The review analysed 27 papers between 2008 and 2018 in peer-reviewed journals.

Findings

Blockchain–SCM integration is still in its infancy. Scholars and practitioners are not fully aware of the potential of blockchain technology to disrupt traditional business models. However, the electric power industry seems to have a relatively mature understanding of blockchain–SCM integration, demonstrated by the use of smart contracts. Additionally, the disintermediation provided by blockchain applications has the potential to disrupt traditional industries (e.g. health care, transportation and retail).

Research limitations/implications

The limitations of this study are represented mainly by the scarcity of studies on blockchain–SCM integration in leading journals and databases.

Practical implications

This study highlights examples of blockchain–SCM integration, emphasising the need to rethink business models to incorporate blockchain technology.

Originality/value

This study is the first attempt to synthesise existing publications about the blockchain–SCM integration, shedding light on the disruption caused by, and the necessity of, the SCM reconfigurations.

Details

Supply Chain Management: An International Journal, vol. 25 no. 2
Type: Research Article
ISSN: 1359-8546

Keywords

1 – 10 of over 9000