Search results

1 – 10 of over 6000
Article
Publication date: 3 January 2023

Abdullah Oguz, Nikhil Mehta and Prashant Palvia

This study aims to develop a unified theoretical framework that presents a cohesive picture of workplace cyberbullying to better understand the interplay between cyberbullying…

1012

Abstract

Purpose

This study aims to develop a unified theoretical framework that presents a cohesive picture of workplace cyberbullying to better understand the interplay between cyberbullying, its effects on organizations and organizational controls enacted to contain these effects.

Design/methodology/approach

The study conducts a theoretical review of the workplace cyberbullying literature between 2005 and 2021 drawing upon existing literature and two important theories, the routine activities theory and control theory. The final sample of 54 empirical papers represents a comprehensive body of literature on cyberbullying published across various disciplines.

Findings

A theoretical model of workplace cyberbullying is developed, which highlights major antecedents to workplace cyberbullying and its impact on individual employees as well as organizations.

Originality/value

As firms increasingly rely on information and communication technologies (ICTs), the misuse of ICTs in the form of cyberbullying is also increasing. Workplace cyberbullying severely hurts an organization’s employees and compromises the efficacy of its information systems. Fortunately, various controls can be utilized by firms to minimize workplace cyberbullying and its attendant costs. In all, eleven propositions are offered, providing a robust agenda for future research. The authors also offer insights for practitioners on how to minimize cyberbullying in the workplace and its damaging effects.

Article
Publication date: 25 June 2020

Naci Akdemir and Christopher James Lawless

The purpose of this study was to explore human factors as the possible facilitator of cyber-dependent (hacking and malware infection) and cyber-enabled (phishing) crimes…

4073

Abstract

Purpose

The purpose of this study was to explore human factors as the possible facilitator of cyber-dependent (hacking and malware infection) and cyber-enabled (phishing) crimes victimisation and to test the applicability of lifestyle routine activities theory (LRAT) to cybercrime victimisation.

Design/methodology/approach

A mixed methods research paradigm was applied to address the research questions and aims. The data set of Crime Survey of England and Wales (CSEW) 2014/2015 and 42 semi-structured interviews conducted with victims of cybercrime and non-victim control group participants were analysed via binary logistic regression and content analyses methods.

Findings

This research illustrated that Internet users facilitated their victimisation through their online activities. Additionally, using insecure Internet connections and public access computers emerged as risk factors for both cyber-enabled and cyber-dependent crime victimisation. Voluntary and involuntary personal information disclosure through social networking sites and online advertisement websites increased the likelihood of being a target of phishing. Deviant online activities such as free streaming or peer-to-peer sharing emerged to increase the risk of cyber-dependent crime victimisation.

Research limitations/implications

The binary logistic regression analysis results suggested LRAT as a more suitable theoretical framework for cyber-dependent crime victimisation. Future research may test this result with models including more macro variables.

Practical implications

Policymakers may consider implementing regulations regarding limiting the type of information required to login to free Wi-Fi connections. Checking trust signs and green padlocks may be effective safeguarding measures to lessen the adverse impacts of impulsive buying.

Originality/value

This study empirically illustrated that, besides individual-level factors, macro-level factors such as electronic devices being utilised to access the Internet and data breaches of large companies also increased the likelihood of becoming the victim of cyber-enabled and cyber-dependent crime.

Details

Internet Research, vol. 30 no. 6
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 12 June 2017

Mica Grujicic, Jennifer Snipes and S. Ramaswami

The purpose of this paper is to model a nacre-like composite material, consisting of tablets and polyurea tablet/tablet interfaces, B4C. This composite material is being…

Abstract

Purpose

The purpose of this paper is to model a nacre-like composite material, consisting of tablets and polyurea tablet/tablet interfaces, B4C. This composite material is being considered in the construction of the so-called backing-plate, a layer within a multi-functional/multi-layer armor system.

Design/methodology/approach

Considering the basic functions of the backing-plate (i.e. to provide structural support for the ceramic-strike-face and to stop a high-velocity projectile and the accompanying fragments) in such an armor system, the composite-material architecture is optimized with respect to simultaneously achieving high flexural stiffness and high ballistic-penetration resistance. Flexural stiffness and penetration resistance, for a given architecture of the nacre-like composite material, are assessed using a series of transient non-linear dynamics finite-element analyses. The suitability of the optimized composite material for use in backing-plate applications is then evaluated by comparing its performance against that of the rolled homogeneous armor (RHA), a common choice for the backing-plate material.

Findings

The results obtained established: a trade-off between the requirements for a high flexural stiffness and a high ballistic-penetration resistance in the nacre-like composite material; and overall superiority of the subject composite material over the RHA when used in the construction of the backing-plate within multi-functional/multi-layer armor systems.

Originality/value

This study extends the authors previous research on nacre-mimetic armor to optimize the architecture of the armor with respect to its flexural stiffness and ballistic-penetration resistance, so that these properties could be increased over the levels attained in the current choice (RHA) for the backing layer of multi-functional/multi-layer armor.

Details

International Journal of Structural Integrity, vol. 8 no. 3
Type: Research Article
ISSN: 1757-9864

Keywords

Article
Publication date: 1 February 1990

Gordon Wills, Sherril H. Kennedy, John Cheese and Angela Rushton

To achieve a full understanding of the role ofmarketing from plan to profit requires a knowledgeof the basic building blocks. This textbookintroduces the key concepts in the art…

16627

Abstract

To achieve a full understanding of the role of marketing from plan to profit requires a knowledge of the basic building blocks. This textbook introduces the key concepts in the art or science of marketing to practising managers. Understanding your customers and consumers, the 4 Ps (Product, Place, Price and Promotion) provides the basic tools for effective marketing. Deploying your resources and informing your managerial decision making is dealt with in Unit VII introducing marketing intelligence, competition, budgeting and organisational issues. The logical conclusion of this effort is achieving sales and the particular techniques involved are explored in the final section.

Details

Management Decision, vol. 28 no. 2
Type: Research Article
ISSN: 0025-1747

Keywords

Book part
Publication date: 13 May 2019

Rosaria Rita Canale and Rajmund Mirdala

The role of money and monetary policy of the central bank in pursuing macroeconomic stability has significantly changed over the period since the end of World War II…

Abstract

The role of money and monetary policy of the central bank in pursuing macroeconomic stability has significantly changed over the period since the end of World War II. Globalization, liberalization, integration, and transition processes generally shaped the crucial milestones of the macroeconomic development and substantial features of economic policy and its framework in Europe. Policy-driven changes together with variety of exogenous shocks significantly affected the key features of macroeconomic environment on the European continent that fashioned the framework and design of monetary policies.

This chapter examines the key basis of the central bank’s monetary policy on its way to pursue and preserve the internal and external stability of the purchasing power of money. Substantial elements of the monetary policy like objectives and strategies are not only generally introduced but also critically discussed according to their accuracy, suitability, and reliability in the changing macroeconomic conditions. Brief overview of the Eurozone common monetary policy milestones and the past Eastern bloc countries’ experience with a variety of exchange rate regimes provides interesting empirical evidence on origins and implications of vital changes in the monetary policy conduction in Europe and the Eurozone.

Details

Fiscal and Monetary Policy in the Eurozone: Theoretical Concepts and Empirical Evidence
Type: Book
ISBN: 978-1-78743-793-7

Keywords

Article
Publication date: 4 August 2022

Thomas Riemann and Joachim Metternich

The purpose of this approach is to structure and facilitate the development of competency-oriented virtual training scenarios. This approach should help to develop reproducible…

Abstract

Purpose

The purpose of this approach is to structure and facilitate the development of competency-oriented virtual training scenarios. This approach should help to develop reproducible results.

Design/methodology/approach

This publication presents a procedure for the structured, competency-oriented design of virtual teaching–learning environments. The procedure is based on the competency-oriented design of learning factories according to Tisch and consists of a total of three phases with various substeps. The different steps of the method are presented by means of an application example and the generated scenario is evaluated by means of a competency measurement according to Glass regarding its suitability for teaching competencies.

Findings

In addition to an application example that introduces the approach, this publication presents concrete results from the research project. In addition to a review of the opportunities and limitations of virtual reality (VR) in continuing education, these also refer to possible, realizable requirements for the use of VR. In addition, results on the suitability of VR learning environments for competency development in the context of value streaming mapping training are presented.

Originality/value

This approach represents a substantial extension of existing concepts for the design of physical learning factory training for lean topics. It can help learning factory operators and other training providers to design competency- and user-oriented virtual training. VR offers a multitude of potentials in this context, but these can only be exploited through conscientious use of the technology.

Details

International Journal of Lean Six Sigma, vol. 14 no. 6
Type: Research Article
ISSN: 2040-4166

Keywords

Article
Publication date: 17 August 2012

G.S. Aglietti, S.J.I. Walker and A. Kiley

The purpose of this paper is to assess the suitability of various methods for the reduction of a large finite element model (FEM) of satellites to produce models to be used for…

Abstract

Purpose

The purpose of this paper is to assess the suitability of various methods for the reduction of a large finite element model (FEM) of satellites to produce models to be used for correlation of the FEM with test results. The robustness of the cross‐orthogonality checks (COC) for the correlation process carried out utilizing the reduced model is investigated, showing its dependence on the number of mode shapes used in the reduction process. Finally the paper investigates the improvement in the robustness of the COC that can be achieved utilizing optimality criteria for the selection of the degrees of freedom (DOF) used for the correlation process.

Design/methodology/approach

A Monte Carlo approach has been used to simulate inaccuracies in the mode shapes (analysis and experimental) of a satellite FEM that are compared during the COC. The sensitivity of the COC to the parameters utilized during the reduction process, i.e. mode shapes and DOFs, is then assessed for different levels of inaccuracy in the mode shapes.

Findings

The System Equivalent Expansion Reduction Process (SEREP) has been identified as a particularly suitable method, with the advantage that a SEREP reduced model has the same eigenvalues and eigenvector of the whole system therefore automatically meeting the criteria on the quality of the reduced model. The inclusion of a high number of mode shapes in the reduction process makes the check very sensitive to minor experimental or modelling inaccuracies. Finally it was shown that utilizing optimality criteria in the selection of the DOFs to carry out the correlation can significantly improve the probability of meeting the COC criteria.

Research limitations/implications

This work is based on the FEM of the satellite Aeolus, and therefore the numerical values obtained in this study are specific for this application. However, this model represents a typical satellite FEM and therefore the trends identified in this work are expected to be generally valid for this type of structure.

Practical implications

The correlation of satellite FEM with test results involves a substantial effort, and it is crucial to avoid failures of the COC due to numerical issues rather than real model inaccuracies. This work shows also how an inappropriate choice of reduction parameters can lead to failure of the COC in cases when there are only very minor differences (e.g. due to minor amount of noise in the results) between analytical and test results. Vice versa, the work also shows how the robustness of the reduced model can be improved.

Originality/value

The paper shows how the robustness of the correlation process for a satellite FEM carried out utilising a SEREP reduced model needed to be investigated, to demonstrate the suitability of this method to reduce large FEM of satellites.

Article
Publication date: 14 September 2015

Kate L. Daunt (née Reynolds) and Dominique A. Greer

This study aims to use opportunity as a theoretical lens to investigate how the spatio-temporal and social dimensions of the consumption environment create perceived opportunities…

2015

Abstract

Purpose

This study aims to use opportunity as a theoretical lens to investigate how the spatio-temporal and social dimensions of the consumption environment create perceived opportunities for consumers to misbehave.

Design/methodology/approach

Drawing on routine activity theory and social impact theory, the authors use two experiments to demonstrate that spatio-temporal and social dimensions can explain consumer theft in retail settings.

Findings

Study 1 reveals mixed empirical support for the basic dimensions of routine activity theory, which posits that the opportunity to thieve is optimised when a motivated offender, suitable target and the absence of a capable formal guardian transpire in time and space. Extending the notion of guardianship, Study 2 tests social impact theory and shows that informal guardianship impacts the likelihood of theft under optimal routine activity conditions.

Originality/value

The study findings highlight important implications for academicians and retail managers: rather than focusing on the uncontrollable characteristics of thieving offenders, more controllable spatio-temporal and social factors of the retail environment can be actively monitored and manipulated to reduce perceived opportunities for consumer misbehaviour.

Details

European Journal of Marketing, vol. 49 no. 9/10
Type: Research Article
ISSN: 0309-0566

Keywords

Article
Publication date: 10 October 2023

Stefano De Paoli and Jason Johnstone

This paper presents a qualitative study of penetration testing, the practice of attacking information systems to find security vulnerabilities and fixing them. The purpose of this…

Abstract

Purpose

This paper presents a qualitative study of penetration testing, the practice of attacking information systems to find security vulnerabilities and fixing them. The purpose of this paper is to understand whether and to what extent penetration testing can reveal various socio-organisational factors of information security in organisations. In doing so, the paper innovates theory by using Routine Activity Theory together with phenomenology of information systems concepts.

Design/methodology/approach

The articulation of Routine Activity Theory and phenomenology emerged inductively from the data analysis. The data consists of 24 qualitative interviews conducted with penetration testers, analysed with thematic analysis.

Findings

The starting assumption is that penetration testers are akin to offenders in a crime situation, dealing with targets and the absence of capable guardians. A key finding is that penetration testers described their targets as an installed base, highlighting how vulnerabilities, which make a target suitable, often emerge from properties of the existing built digital environments. This includes systems that are forgotten or lack ongoing maintenance. Moreover, penetration testers highlighted that although the testing is often predicated on planned methodologies, often they resort to serendipitous practices such as improvisation.

Originality/value

This paper contributes to theory, showing how Routine Activity Theory and phenomenological concepts can work together in the study of socio-organisational factors of information security. This contribution stems from considering that much research on information security focuses on the internal actions of organisations. The study of penetration testing as a proxy of real attacks allows novel insights into socio-organisational factors of information security in organisations.

Details

Information Technology & People, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 30 November 2020

Christoffer Rybski and Roland Jochem

Industry 4.0 is one of the most used terms in the current industrial discussion. There are several perspectives and approaches related to Industry 4.0 so far, but no universal…

Abstract

Purpose

Industry 4.0 is one of the most used terms in the current industrial discussion. There are several perspectives and approaches related to Industry 4.0 so far, but no universal definition. Often-mentioned basic requirements to “implement” Industry 4.0 are lean and well-organized processes. In the past and still until today, a lot of companies try to implement lean production systems (LPS) according to the example of Toyota to realize a systematic approach to ensure well-organized processes. The process model aims to support organizations to integrate Industry 4.0 elements into LPS, regardless of the size of the organization. The purpose of this paper to describe a model as a first basis for further elaborations that could focus on the detailed design of each model-phases. Furthermore, the identified digital elements of Industry 4.0 build a first foundation to choose pilot projects related to existing challenges of the organizations LPS. In this context, especially the suitability of LPS and Industry 4.0 elements should be further investigated.

Design/methodology/approach

To investigate the current status regarding the realization of Industry 4.0 approaches and related challenges in the German industry, the two authors realized a survey with over 300 participants from different sectors and company sizes, using an online questionnaire. The results of the survey will be a part of this paper and a technology analysis, which was the outcome of an extensive literature analysis. The results were summarized in a model to integrate digital elements into existing LPS. Practitioners can use the process model as a first orientation to integrate industry 4.0 technologies into their existing LPS, based on specific challenges with their LPS processes.

Findings

Even if most of the participating German companies recognize Industry 4.0 as an important or very important topic, many of them do not consider themselves well prepared. The participants see huge challenges with regard to the needed qualifications and investments Industry 4.0 requires. In general, the companies hope to improve productivity and customer satisfaction to name two main objectives of the implementation of digital elements of Industry 4.0. In addition to the survey, a profound literature analysis was made and identified eight core digital elements. On this basis a milestone-based model to integrate these digital elements into existing LPS was developed.

Originality/value

This paper considers results from a study and analysis regarding the potentials of digital elements of Industry 4.0 for production system from different angles and introduces a model for integrating these elements.

Details

International Journal of Quality and Service Sciences, vol. 13 no. 1
Type: Research Article
ISSN: 1756-669X

Keywords

1 – 10 of over 6000