Search results
1 – 10 of 322Tung-Cheng Lin and Mei-Ling Yeh
The ecosystem concept has attracted attention in information system research to explain business competition, innovation and many other emerging phenomena. Existing studies focus…
Abstract
Purpose
The ecosystem concept has attracted attention in information system research to explain business competition, innovation and many other emerging phenomena. Existing studies focus more on a single ecosystem type or a single ecosystem goal and pay little attention to the ecosystem’s evolution. The objective of the study is to investigate the factors that impact the evolution of the information ecosystem (IE) to gain a better understanding of strategic thinking.
Design/methodology/approach
The IE involves many actors, so the multi-case study approach is conducted with purposeful sampling to recruit all the significant ecosystem actors. The collected qualitative data are analyzed by coding data, exploring data relationships and structuring pattern steps; institutional theory is used as a theoretical framework.
Findings
The results demonstrate that industry practices, laws and regulations, new actors and the mimetic pressure of outsourcers drive the growth of the ecosystem. Strategy intention, cost pressure and normative pressure all contribute to the IE’s evolution.
Originality/value
The concept of ecosystems has attracted attention in information system research. The study investigates the factors contributing to the evolution of the IE from an institutional theory perspective. Our suggestion is that new players can find a niche in offering information technology (IT)/ information services (IS)-related solutions to survive in the ecosystem; however, they need to pay attention to the normative pressure.
Details
Keywords
Satyendra Kr Sharma, Rajkumar Sharma and Anil Jindal
Supply chain vulnerability (SCV) analysis is vital for manufacturers globally because it creates a pathway for building resilient supply chains in uncertain environments. This…
Abstract
Purpose
Supply chain vulnerability (SCV) analysis is vital for manufacturers globally because it creates a pathway for building resilient supply chains in uncertain environments. This study aims to identify drivers of SCV in the Indian manufacturing sector.
Design/methodology/approach
Sixteen drivers were identified from the literature review and followed by expert interviews. Interpretive structural modeling was used to determine the hierarchical structural relationship among identified SCV factors.
Findings
It was found that risk is not a board room agenda. Misaligned performance measures with incentives and lack of risk dashboard are the causal factors of SCV. Supply chain security, centralized production and distribution and lack of trust in the supply chain were driven factors.
Originality/value
This provides new insights to assess and prioritize initiatives for supply chain sustainability in terms of continuing business operations. The structural model provides a systemic view of SCV and helps reduce vulnerability.
Details
Keywords
Catherine Sandoval and Patrick Lanthier
This chapter analyzes the link between the digital divide, infrastructure regulation, and disaster planning and relief through a case study of the flood in San Jose, California…
Abstract
This chapter analyzes the link between the digital divide, infrastructure regulation, and disaster planning and relief through a case study of the flood in San Jose, California triggered by the Anderson dam’s overtopping in February 2017 and an examination of communication failures during the 2018 wildfire in Paradise, California. This chapter theorizes that regulatory decisions construct social and disaster vulnerability. Rooted in the Whole Community approach to disaster planning and relief espoused by the United Nations and the Federal Emergency Management Agency, this chapter calls for leadership to end the digital divide. It highlights the imperative of understanding community information needs and argues for linking strategies to close the digital divide with infrastructure and emergency planning. As the Internet’s integration into society increases, the digital divide diminishes access to societal resources including disaster aid, and exacerbates wildfire, flood, pandemic, and other risks. To mitigate climate change, climate-induced disaster, protect access to social services and the economy, and safeguard democracy, it argues for digital inclusion strategies as a centerpiece of community-centered infrastructure regulation and disaster relief.
Details
Keywords
Debora Gottardello and Solmaz Filiz Karabag
Using the lens of crisis innovation and strategic alignment, this study explores how a segment of the restaurant sector that may be less agile than others—Michelin-starred…
Abstract
Purpose
Using the lens of crisis innovation and strategic alignment, this study explores how a segment of the restaurant sector that may be less agile than others—Michelin-starred restaurants—perceives and aligns with the challenges brought about by the COVID-19-pandemic.
Design/methodology/approach
The study collected data from 19 Michelin-starred restaurants in Spain using a qualitative interview method. The data were analyzed qualitatively and organized thematically.
Findings
Four key categories of strategic challenges were identified: human resources, uncertainty, control and economic challenges. In response, chefs displayed both behavioral and organizational strategies. Those organizational strategies were new human resource management, reorganization, product and service innovation and marketing. While the new human resource management actions adopted to align with the human resource challenges identified, a misalignment remains between some of the other strategic actions, such as product and service innovation, marketing and economic and uncertainty challenges.
Originality/value
The findings offer new insight into Michelin-starred restaurant chefs' challenges and (mis)alignment strategies, an area that has been understudied in the current literature on innovative responses in the hospitality sector post-pandemic.
Details
Keywords
Antoine Feuillet, Loris Terrettaz and Mickaël Terrien
This research aimed to measure the influence of resource dependency (trading and/or shareholder's dependencies) squad age structure by building archetypes to identify strategic…
Abstract
Purpose
This research aimed to measure the influence of resource dependency (trading and/or shareholder's dependencies) squad age structure by building archetypes to identify strategic dominant schemes.
Design/methodology/approach
Based on the Ligue 1 football clubs from the 2009/2010 season to the 2018/2019 data, the authors use the k-means classification to build archetypes of resource dependency and squad structure variables. The influence of resource dependency on squad structure is then analysed through a table of contingency.
Findings
Firstly, the authors identify archetypes of resource dependency with some clubs that are dependent on the transfer market and others that do not count on sales to balance their account. Secondly, they provide different archetypes of squad structure choices. The contingency between those archetypes allows to identify three main strategic schemes (avoidance, shaping and adaptation).
Originality/value
The research tests an original relationship between resource dependency of clubs and their human resource strategy to respond to it. This paper can help to provide detailed profiles for big clubs looking for affiliate clubs to know which clubs have efficient academy or player development capacities.
Details
Keywords
The purpose of this research is to further the understanding of how to implement gender-responsive budgeting (GRB) systems. The author explores whether GRB reforms might benefit…
Abstract
Purpose
The purpose of this research is to further the understanding of how to implement gender-responsive budgeting (GRB) systems. The author explores whether GRB reforms might benefit from integration into a performance-oriented budgetary structure and whether GRB's equity orientation is linked to additional implementation challenges.
Design/methodology/approach
This research follows a qualitative case study of South Korea guided by a predetermined research framework and built from extensive documentation, archival records and expert interviews.
Findings
GRB’s integration into a performance framework can be burdensome, and the equity orientation of GRB results in additional implementation challenges, such as higher vulnerability to the political context and active resistance from public officials.
Originality/value
This research shows that integrating GRB with performance systems may require overcoming significant administrative obstacles. Also, GRB’s equity orientation is linked to a higher vulnerability to the political cycle and active resistance from civil servants.
Details
Keywords
Sayed Muhammad Fawad Sharif, Yang Naiding and Sayed Kifayat Shah
Collaborative projects require overlapping skills and capabilities to facilitate knowledge transfer. However, not all kinds of learning are virtuous and some may lead to leakage…
Abstract
Purpose
Collaborative projects require overlapping skills and capabilities to facilitate knowledge transfer. However, not all kinds of learning are virtuous and some may lead to leakage of commercially valuable knowledge. The purpose of this paper is to explain and restrain leakage of organizational competitive knowledge in collaborative projects.
Design/methodology/approach
A total of 398 survey questionnaires are collected from project-based firms in Pakistan. We gathered data from horizontal and vertical collaborations. Analysis is conducted with transaction cost economics lens through Process Macro 3.0.
Findings
Findings suggest that partner’s learning intent (PLI) and distrust positively affect knowledge leakage, whereas human resource management (HRM) practices have negative effect on knowledge leakage. Furthermore, HRM practices negatively moderate the relationship between PLI and knowledge leakage and distrust positively mediates it.
Research limitations/implications
This study integrates HRM with knowledge management to restrain knowledge leakage and contributes to knowledge management and strategic management. This study examines knowledge leakage in the presence of passive opportunism.
Originality/value
This study explains how passive opportunism translates into opportunistic behavior. Besides, effectiveness of HRM practices are least surveyed to restrain passive and active opportunisms.
Details
Keywords
Kassa Woldesenbet Beta, Natasha Katuta Mwila and Olapeju Ogunmokun
This paper seeks to systematically review and synthesise existing research knowledge on African women entrepreneurship to identify gaps for future studies.
Abstract
Purpose
This paper seeks to systematically review and synthesise existing research knowledge on African women entrepreneurship to identify gaps for future studies.
Design/methodology/approach
The paper conducted a systematic literature review of published studies from 1990 to 2020 on women entrepreneurship in Africa using a 5M gender aware framework of Brush et al. (2009).
Findings
The systematic literature review of published studies found the fragmentation, descriptive and prescriptive orientation of studies on Africa women entrepreneurship and devoid of theoretical focus. Further, women entrepreneurship studies tended to be underpinned from various disciplines, less from the entrepreneurship lens, mostly quantitative, and at its infancy stage of development. With a primary focus on development, enterprise performance and livelihood, studies rarely attended to issues of motherhood and the nuanced understanding of women entrepreneurship’s embeddedness in family and institutional contexts of Africa.
Research limitations/implications
The paper questions the view that women entrepreneurship is a “panacea” and unravels how family context, customary practices, poverty and, rural-urban and formal/informal divide, significantly shape and interact with African women entrepreneurs’ enterprising experience and firm performance.
Practical implications
The findings and analyses indicate that any initiatives to support women empowerment via entrepreneurship should consider the socially constructed nature of women entrepreneurship and the subtle interplay of the African institutional contexts’ intricacies, spatial and locational differences which significantly influence women entrepreneurs’ choices, motivations and goals for enterprising.
Originality/value
The paper contributes to a holistic understanding of women entrepreneurship in Africa by using a 5M framework to review the research knowledge. In addition, the paper not only identifies unexplored/or less examined issues but also questions the taken-for-granted assumptions of existing knowledge and suggest adoption of context- and gender-sensitive theories and methods.
Details
Keywords
Due to its high leverage nature, a bank suffers vitally from the credit risk it inherently bears. As a result, managing credit is the ultimate responsibility of a bank. In this…
Abstract
Due to its high leverage nature, a bank suffers vitally from the credit risk it inherently bears. As a result, managing credit is the ultimate responsibility of a bank. In this chapter, we examine how efficiently banks manage their credit risk via a powerful tool used widely in the decision/management science area called data envelopment analysis (DEA). Among various existing versions, our DEA is a two-stage, dynamic model that captures how each bank performs relative to its peer banks in terms of value creation and credit risk control. Using data from the largest 22 banks in the United States over the period of 1996 till 2013, we have identified leading banks such as First Bank systems and Bank of New York Mellon before and after mergers and acquisitions, respectively. With the goal of preventing financial crises such as the one that occurred in 2008, a conceptual model of credit risk reduction and management (CRR&M) is proposed in the final section of this study. Discussions on strategy formulations at both the individual bank level and the national level are provided. With the help of our two-stage DEA-based decision support systems and CRR&M-driven strategies, policy/decision-makers in a banking sector can identify improvement opportunities regarding value creation and risk mitigation. The effective tool and procedures presented in this work will help banks worldwide manage the unknown and become more resilient to potential credit crises in the 21st century.
Details
Keywords
Miguel Calvo and Marta Beltrán
This paper aims to propose a new method to derive custom dynamic cyber risk metrics based on the well-known Goal, Question, Metric (GQM) approach. A framework that complements it…
Abstract
Purpose
This paper aims to propose a new method to derive custom dynamic cyber risk metrics based on the well-known Goal, Question, Metric (GQM) approach. A framework that complements it and makes it much easier to use has been proposed too. Both, the method and the framework, have been validated within two challenging application domains: continuous risk assessment within a smart farm and risk-based adaptive security to reconfigure a Web application firewall.
Design/methodology/approach
The authors have identified a problem and provided motivation. They have developed their theory and engineered a new method and a framework to complement it. They have demonstrated the proposed method and framework work, validating them in two real use cases.
Findings
The GQM method, often applied within the software quality field, is a good basis for proposing a method to define new tailored cyber risk metrics that meet the requirements of current application domains. A comprehensive framework that formalises possible goals and questions translated to potential measurements can greatly facilitate the use of this method.
Originality/value
The proposed method enables the application of the GQM approach to cyber risk measurement. The proposed framework allows new cyber risk metrics to be inferred by choosing between suggested goals and questions and measuring the relevant elements of probability and impact. The authors’ approach demonstrates to be generic and flexible enough to allow very different organisations with heterogeneous requirements to derive tailored metrics useful for their particular risk management processes.
Details