Search results

1 – 10 of over 2000
Article
Publication date: 13 December 2023

Yuanyuan Guo, Chaoyou Wang and Xiaoting Chen

This study aims to examine the relative effectiveness of functional and financial remedies in influencing customers' negative coping responses in the event of a data breach. It…

Abstract

Purpose

This study aims to examine the relative effectiveness of functional and financial remedies in influencing customers' negative coping responses in the event of a data breach. It also uncovers the different mediating roles played by customers' feelings of anger and fear in the process of data breach recovery. This study thus differs from the literature, which has primarily focused on the impact of financial compensation and apologies for service failures in face-to-face environments.

Design/methodology/approach

Two scenario-based experiments were conducted to empirically validate the model. The authors received 302 copies of the questionnaire, of which 269 were valid.

Findings

This study finds that functional remedies are more effective than financial remedies when sensitive information has been compromised, but there is no significant difference between the effectiveness of the two remedies when nonsensitive information has been compromised. In addition, functional remedies influence negative coping behaviors directly and indirectly; the indirect effect is achieved through the reduction of fear and anger. Contrary to the authors' expectation, financial remedies do not have a direct effect on negative coping behaviors; they can indirectly affect negative coping behaviors by reducing anger but do not affect negative coping behaviors by reducing fear.

Practical implications

This study provides key insights into how to manage customer reactions in the event of a data breach, suggesting the use of carefully designed recovery strategies. Companies must attend to customers' specific emotional responses to manage their negative coping behaviors.

Originality/value

This study extends the limited literature on data breach recovery actions by investigating the different effectiveness of functional and financial remedies in the event of a data breach. It also uncovers how functional and financial recovery strategies affect customers' negative coping behaviors by revealing the different mediating effects of fear and anger.

Details

Journal of Enterprise Information Management, vol. 37 no. 1
Type: Research Article
ISSN: 1741-0398

Keywords

Article
Publication date: 15 July 2021

Nehemia Sugianto, Dian Tjondronegoro, Rosemary Stockdale and Elizabeth Irenne Yuwono

The paper proposes a privacy-preserving artificial intelligence-enabled video surveillance technology to monitor social distancing in public spaces.

Abstract

Purpose

The paper proposes a privacy-preserving artificial intelligence-enabled video surveillance technology to monitor social distancing in public spaces.

Design/methodology/approach

The paper proposes a new Responsible Artificial Intelligence Implementation Framework to guide the proposed solution's design and development. It defines responsible artificial intelligence criteria that the solution needs to meet and provides checklists to enforce the criteria throughout the process. To preserve data privacy, the proposed system incorporates a federated learning approach to allow computation performed on edge devices to limit sensitive and identifiable data movement and eliminate the dependency of cloud computing at a central server.

Findings

The proposed system is evaluated through a case study of monitoring social distancing at an airport. The results discuss how the system can fully address the case study's requirements in terms of its reliability, its usefulness when deployed to the airport's cameras, and its compliance with responsible artificial intelligence.

Originality/value

The paper makes three contributions. First, it proposes a real-time social distancing breach detection system on edge that extends from a combination of cutting-edge people detection and tracking algorithms to achieve robust performance. Second, it proposes a design approach to develop responsible artificial intelligence in video surveillance contexts. Third, it presents results and discussion from a comprehensive evaluation in the context of a case study at an airport to demonstrate the proposed system's robust performance and practical usefulness.

Details

Information Technology & People, vol. 37 no. 2
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 5 April 2024

Jawahitha Sarabdeen and Mohamed Mazahir Mohamed Ishak

General Data Protection Regulation (GDPR) of the European Union (EU) was passed to protect data privacy. Though the GDPR intended to address issues related to data privacy in the…

Abstract

Purpose

General Data Protection Regulation (GDPR) of the European Union (EU) was passed to protect data privacy. Though the GDPR intended to address issues related to data privacy in the EU, it created an extra-territorial effect through Articles 3, 45 and 46. Extra-territorial effect refers to the application or the effect of local laws and regulations in another country. Lawmakers around the globe passed or intensified their efforts to pass laws to have personal data privacy covered so that they meet the adequacy requirement under Articles 45–46 of GDPR while providing comprehensive legislation locally. This study aims to analyze the Malaysian and Saudi Arabian legislation on health data privacy and their adequacy in meeting GDPR data privacy protection requirements.

Design/methodology/approach

The research used a systematic literature review, legal content analysis and comparative analysis to critically analyze the health data protection in Malaysia and Saudi Arabia in comparison with GDPR and to see the adequacy of health data protection that could meet the requirement of EU data transfer requirement.

Findings

The finding suggested that the private sector is better regulated in Malaysia than the public sector. Saudi Arabia has some general laws to cover health data privacy in both public and private sector organizations until the newly passed data protection law is implemented in 2024. The finding also suggested that the Personal Data Protection Act 2010 of Malaysia and the Personal Data Protection Law 2022 of Saudi Arabia could be considered “adequate” under GDPR.

Originality/value

The research would be able to identify the key principles that could identify the adequacy of the laws about health data in Malaysia and Saudi Arabia as there is a dearth of literature in this area. This will help to propose suggestions to improve the laws concerning health data protection so that various stakeholders can benefit from it.

Details

International Journal of Law and Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1754-243X

Keywords

Article
Publication date: 1 April 2024

Xiaoxian Yang, Zhifeng Wang, Qi Wang, Ke Wei, Kaiqi Zhang and Jiangang Shi

This study aims to adopt a systematic review approach to examine the existing literature on law and LLMs.It involves analyzing and synthesizing relevant research papers, reports…

Abstract

Purpose

This study aims to adopt a systematic review approach to examine the existing literature on law and LLMs.It involves analyzing and synthesizing relevant research papers, reports and scholarly articles that discuss the use of LLMs in the legal domain. The review encompasses various aspects, including an analysis of LLMs, legal natural language processing (NLP), model tuning techniques, data processing strategies and frameworks for addressing the challenges associated with legal question-and-answer (Q&A) systems. Additionally, the study explores potential applications and services that can benefit from the integration of LLMs in the field of intelligent justice.

Design/methodology/approach

This paper surveys the state-of-the-art research on law LLMs and their application in the field of intelligent justice. The study aims to identify the challenges associated with developing Q&A systems based on LLMs and explores potential directions for future research and development. The ultimate goal is to contribute to the advancement of intelligent justice by effectively leveraging LLMs.

Findings

To effectively apply a law LLM, systematic research on LLM, legal NLP and model adjustment technology is required.

Originality/value

This study contributes to the field of intelligent justice by providing a comprehensive review of the current state of research on law LLMs.

Details

International Journal of Web Information Systems, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1744-0084

Keywords

Article
Publication date: 1 February 2024

Hakeem A. Owolabi, Azeez A. Oyedele, Lukumon Oyedele, Hafiz Alaka, Oladimeji Olawale, Oluseyi Aju, Lukman Akanbi and Sikiru Ganiyu

Despite an enormous body of literature on conflict management, intra-group conflicts vis-à-vis team performance, there is currently no study investigating the conflict prevention…

Abstract

Purpose

Despite an enormous body of literature on conflict management, intra-group conflicts vis-à-vis team performance, there is currently no study investigating the conflict prevention approach to handling innovation-induced conflicts that may hinder smooth implementation of big data technology in project teams.

Design/methodology/approach

This study uses constructs from conflict theory, and team power relations to develop an explanatory framework. The study proceeded to formulate theoretical hypotheses from task-conflict, process-conflict, relationship and team power conflict. The hypotheses were tested using Partial Least Square Structural Equation Model (PLS-SEM) to understand key preventive measures that can encourage conflict prevention in project teams when implementing big data technology.

Findings

Results from the structural model validated six out of seven theoretical hypotheses and identified Relationship Conflict Prevention as the most important factor for promoting smooth implementation of Big Data Analytics technology in project teams. This is followed by power-conflict prevention, prevention of task disputes and prevention of Process conflicts respectively. Results also show that relationship and power conflicts interact on the one hand, while task and relationship conflict prevention also interact on the other hand, thus, suggesting the prevention of one of the conflicts could minimise the outbreak of the other.

Research limitations/implications

The study has been conducted within the context of big data adoption in a project-based work environment and the need to prevent innovation-induced conflicts in teams. Similarly, the research participants examined are stakeholders within UK projected-based organisations.

Practical implications

The study urges organisations wishing to embrace big data innovation to evolve a multipronged approach for facilitating smooth implementation through prevention of conflicts among project frontlines. This study urges organisations to anticipate both subtle and overt frictions that can undermine relationships and team dynamics, effective task performance, derail processes and create unhealthy rivalry that undermines cooperation and collaboration in the team.

Social implications

The study also addresses the uncertainty and disruption that big data technology presents to employees in teams and explore conflict prevention measure which can be used to mitigate such in project teams.

Originality/value

The study proposes a Structural Model for establishing conflict prevention strategies in project teams through a multidimensional framework that combines constructs like team power conflict, process, relationship and task conflicts; to encourage Big Data implementation.

Details

Information Technology & People, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0959-3845

Keywords

Book part
Publication date: 14 March 2024

Giulia Pavone and Kathleen Desveaud

This chapter provides an overview of the strategic implications of chatbot use and implementation, including potential applications in marketing, and factors affecting customer…

Abstract

This chapter provides an overview of the strategic implications of chatbot use and implementation, including potential applications in marketing, and factors affecting customer acceptance. After presenting a brief history and a classification of conversational artificial intelligence (AI) and chatbots, the authors provide an in-depth review at the crossroads between marketing, business, and human–computer interaction, to outline the main factors that drive users' perceptions and acceptance of chatbots. In particular, the authors describe technology-related factors and chatbot design characteristics, such as anthropomorphism, gender, identity, and emotional design; context-related factors, such as the product type, task orientation, and consumption contexts; and users-related factors such as sociodemographic and psychographic characteristics. Next, the authors detail the strategic importance of chatbots in the field of marketing and their impact on consumers' perceived service quality, satisfaction, trust, and loyalty. After discussing the ethical implications related to chatbots implementation, the authors conclude with an exploration of future opportunities and potential strategies related to new generative AI technologies, such as ChatGPT. Throughout the chapter, the authors offer theoretical insights and practical implications for incorporating conversational AI into marketing strategies.

Details

The Impact of Digitalization on Current Marketing Strategies
Type: Book
ISBN: 978-1-83753-686-3

Keywords

Article
Publication date: 28 February 2023

Gautam Srivastava and Surajit Bag

Data-driven marketing is replacing conventional marketing strategies. The modern marketing strategy is based on insights derived from customer behavior information gathered from…

1634

Abstract

Purpose

Data-driven marketing is replacing conventional marketing strategies. The modern marketing strategy is based on insights derived from customer behavior information gathered from their facial expressions and neuro-signals. This study explores the potential for face recognition and neuro-marketing in modern-day marketing.

Design/methodology/approach

The study conducts an in-depth examination of the extant literature on neuro-marketing and facial recognition marketing. The articles for review are downloaded from the Scopus database, and PRISMA (Preferred Reporting Items for Systematic Reviews and Meta-Analyses) is then used to screen and choose the relevant papers. The systematic literature review method is applied to conduct the study.

Findings

An extensive review of the literature reveals that the domains of neuro-marketing and face recognition marketing remain understudied. The authors’ review of selected papers delivers five neuro-marketing and facial recognition marketing themes that are essential to modern marketing concepts.

Practical implications

Neuro-marketing and facial recognition marketing are artificial intelligence (AI)-enabled marketing techniques that assist in gaining cognitive insights into human behavior. The findings would be of use to managers in designing marketing strategies to enhance their marketing approach and boost conversion rates.

Originality/value

The uniqueness of this study lies in that it provides an updated review on neuro-marketing and face recognition marketing.

Details

Benchmarking: An International Journal, vol. 31 no. 2
Type: Research Article
ISSN: 1463-5771

Keywords

Article
Publication date: 16 January 2024

Călin Mihail Rangu, Leonardo Badea, Mircea Constantin Scheau, Larisa Găbudeanu, Iulian Panait and Valentin Radu

In recent years, the frequency and severity of cybersecurity incidents have prompted customers to seek out specialized insurance products. However, this has also presented…

Abstract

Purpose

In recent years, the frequency and severity of cybersecurity incidents have prompted customers to seek out specialized insurance products. However, this has also presented insurers with operational challenges and increased costs. The assessment of risks for health systems and cyber–physical systems (CPS) necessitates a heightened degree of attention. The significant values of potential damages and claims request a solid insurance system, part of cyber-resilience. This research paper focuses on the emerging cyber insurance market that is currently in the process of standardizing and improving its risk analysis concerning the potential insured entity.

Design/methodology/approach

The authors' approach involves a quantitative analysis utilizing a Likert-style questionnaire designed to survey cyber insurance professionals. The authors' aim is to identify the current methods used in gathering information from potential clients, as well as the manner in which this information is analyzed by the insurers. Additionally, the authors gather insights on potential improvements that could be made to this process.

Findings

The study the authors elaborated it has a particularly important cyber and risk components for insurance area, because it addresses a “niche” area not yet proper addressed in specialized literature – cyber insurance. Cyber risk management approaches are not uniform at the international level, nor at the insurer level. Also, not all insurers can perform solid assessments, especially since their companies should first prove that they are fully compliant with international cyber security standards.

Research limitations/implications

This research has concentrated on analyzing the current practices in terms of gathering information about the insured entity before issuing the cyber insurance policy, level of details concerning the cyber security posture of the insured entity and way such information should be analyzed in a standardized and useful manner. The novelty of this research resides in the analysis performed as detailed above and the proposals in terms of information gathered, depth of analysis and standardization of approach made. Future work on the topic can focus on the standardization process for analyzing cyber risk for insurance clients, to improve the proposal based also on historical elements and trends in the market. Thus, future research can further refine the standardization process to analyze in more depth the way this can be implemented and included in relevant legislation at the EU level.

Practical implications

Proposed improvements include proposals in terms of the level of detail and the usefulness of an independent centralized approach for information gathering and analysis, especially given the re-insurance and brokerage activities. The authors also propose a common practical procedural approach in risk management, with the involvement of insurance companies and certification institutions of cyber security auditors.

Originality/value

The study investigates the information gathered by insurers from potential clients of cyber insurance and the way this is analyzed and updated for issuance of the insurance policy.

Details

The Journal of Risk Finance, vol. 25 no. 2
Type: Research Article
ISSN: 1526-5943

Keywords

Article
Publication date: 3 April 2024

Tuğçe Karayel, Bahadır Aktaş and Adem Akbıyık

The purpose of this paper is to investigate the cyber hygiene practices of remote workers.

Abstract

Purpose

The purpose of this paper is to investigate the cyber hygiene practices of remote workers.

Design/methodology/approach

This paper used two instruments: first, the Cyber Hygiene Inventory scale, which measures users’ information and computer security behaviors; second, the Recsem Inventory, developed within this paper’s context, to evaluate the cybersecurity measures adopted by organizations for remote workers. It was conducted on remote workers to examine their information security practices. The instrument was administered to a sample of 442 employees reached via the LinkedIn platform. Analyses were performed with SPSS v26, Python programming language and Seaborn library.

Findings

The findings indicate a significant correlation between the security measures implemented by companies and their employees’ cyber hygiene practices. A sector comparison revealed a significant difference in cyber hygiene levels between public and private sector workers.

Research limitations/implications

This paper aims to provide policymakers with suggestions for enhancing the cyber hygiene of remote workers to facilitate compliance with corporate security protocols.

Originality/value

This paper’s conclusions highlight the importance of companies increasing their cybersecurity investments as remote work becomes more prevalent. This should consider not only corporate-level factors but also employees' information and computer security behaviors.

Details

Information & Computer Security, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 15 February 2024

Xin Huang, Ting Tang, Yu Ning Luo and Ren Wang

This study aims to examine the impact of board characteristics on firm performance while also exploring the influential mechanisms that help Chinese listed companies establish…

Abstract

Purpose

This study aims to examine the impact of board characteristics on firm performance while also exploring the influential mechanisms that help Chinese listed companies establish effective boards of directors and strengthen their corporate governance mechanisms.

Design/methodology/approach

This paper uses machine learning methods to investigate the predictive ability of the board of directors' characteristics on firm performance based on the data from Chinese A-share listed companies on the Shanghai and Shenzhen stock exchanges in China during 2008–2021. This study further analyzes board characteristics with relatively strong predictive ability and their predictive models on firm performance.

Findings

The results show that nonlinear machine learning methods are more effective than traditional linear models in analyzing the impact of board characteristics on Chinese firm performance. Among the series characteristics of the board of directors, the contribution ratio in prediction from directors compensation, director shareholding ratio, the average age of directors and directors' educational level are significant, and these characteristics have a roughly nonlinear correlation to the prediction of firm performance; the improvement of the predictive ability of board characteristics on firm performance in state-owned enterprises in China performs better than that in private enterprises.

Practical implications

The findings of this study provide valuable suggestions for enriching the theory of board governance, strengthening board construction and optimizing the effectiveness of board governance. Furthermore, these impacts can serve as a valuable reference for board construction and selection, aiding in the rational selection of boards to establish an efficient and high-performing board of directors.

Originality/value

The study findings unequivocally demonstrate the superiority of nonlinear machine learning approaches over traditional linear models in examining the relationship between board characteristics and firm performance in China. Within the suite of board characteristics, director compensation, shareholding ratio, average age and educational level are particularly noteworthy, consistently demonstrating strong, nonlinear associations with firm performance. Within the suite of board characteristics, director compensation, shareholding ratio, average age and educational level are particularly noteworthy, consistently demonstrating strong, nonlinear associations with firm performance. The study reveals that the predictive performance of board attributes is generally more robust for state-owned enterprises in China in comparison to their counterparts in the private sector.

Details

Chinese Management Studies, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1750-614X

Keywords

1 – 10 of over 2000