Search results

1 – 10 of over 1000
Open Access
Article
Publication date: 4 July 2024

Emmanuel Okoro Ajah

The study aims to embrace the lingering call for more empirical studies that can theorize the role of digital platforms in digital entrepreneurship. Hence, this study seeks to…

Abstract

Purpose

The study aims to embrace the lingering call for more empirical studies that can theorize the role of digital platforms in digital entrepreneurship. Hence, this study seeks to reveal the liminal space entrepreneurial experience of third-party application developers, by investigating how the platform boundary resources promote third-party entrepreneurial actions, as they transition through the disoriented, uncertain and ambiguous processes of digital entrepreneurship development.

Design/methodology/approach

To conduct this investigation, an expert interview qualitative method was used. This approach is a well-established technique in the field of social sciences, which allowed a detailed exploration of the theory of liminality. Liminality refers to the transitional phase that individuals or groups experience when moving from one social or cultural context to another. The expert interview method is appropriate for this study because it involves engaging with knowledgeable individuals who have extensive experience and expertise in the subject area being investigated. Through in-depth and unstructured interviews, the experts were able to provide valuable insights and perspectives about the phenomenon investigated.

Findings

The research findings demonstrate that digital platform boundary resources play a significant role in the behaviour of third-party developers’ who engage in the development of digital entrepreneurship in today’s market. The study highlights three ways that show how these resources (software development kit (SDK), API, integrated development environment (IDE), libraries, frameworks) enable third-party developers to create new applications that are used to pursue entrepreneurship in a digital platform, leading to increased user engagement and revenue generation.

Originality/value

The research addresses the critical roles of digital platform boundary resources in digital entrepreneurship development processes. Also, using liminality theory, the research explicated the core experiences of third-party developers as they navigated the challenges and ambiguities experienced in the pursuit of entrepreneurship. Thus, contributing to the existing body of knowledge in literature and practice.

Details

Journal of Electronic Business & Digital Economics, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2754-4214

Keywords

Article
Publication date: 15 March 2024

Nan Feng, Lei Zhang, Xin Liu and Jing Xie

With the development of digitalization and interconnection, there is a growing need for enterprise customers to ensure the compatibility of the third-party components they are…

Abstract

Purpose

With the development of digitalization and interconnection, there is a growing need for enterprise customers to ensure the compatibility of the third-party components they are using in the manufacturing process, thus raising the integration requirements for the Industrial Internet platform and its third-party developers. Therefore, our study investigates the optimal integration decision of the Industrial Internet platform while considering its access price, the integration cost, and the net utility derived by enterprise customers from the third-party components.

Design/methodology/approach

We model a two-sided Industrial Internet platform that connects customers on the demand side to the developers on the supply side. We then explore the integration decision of the Industrial Internet platform and its important factors by solving the optimal profit function.

Findings

First, despite the high integration cost of third-party developers, the platform still chooses to integrate when enterprise customers derive high utility from the third-party components. Second, due to the compatibility effect, charging the enterprise customers a higher price may reduce the platform profits when these customers derive low utility from the third-party components. Third, the platform profits will increase along with the integration cost of third-party developers when it is low in the case where enterprise customers derive low utility from third-party components.

Originality/value

Our findings offer insightful takeaways for the Industrial Internet platform when making integration decisions.

Details

Industrial Management & Data Systems, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0263-5577

Keywords

Open Access
Article
Publication date: 21 August 2024

Lukas Jürgensmeier, Jan Bischoff and Bernd Skiera

Large digital platforms face intense scrutiny over self-preferencing, which involves a platform provider favoring its own offers over those of competitors. In online marketplaces…

Abstract

Purpose

Large digital platforms face intense scrutiny over self-preferencing, which involves a platform provider favoring its own offers over those of competitors. In online marketplaces, also called retail or e-commerce platforms, much of the academic and regulatory debate focuses on determining whether the marketplace provider gives preference to its own private labels, such as “Amazon Basics” or Walmart’s “Great Value” products. However, we outline, both conceptually and empirically, that self-preferencing can also occur through other dimensions of vertical integration – namely, retailing and fulfillment.

Design/methodology/approach

This article contributes by conceptualizing three dimensions of vertical integration in online marketplaces – private labels, retailing and fulfillment. Then, two studies empirically assess (1) which of the 20 most-visited global online marketplaces vertically integrates which dimension and (2) which share of 600 m available offers is vertically integrated to which degree in eleven international Amazon marketplaces.

Findings

The majority of the leading marketplaces vertically integrate all three dimensions, implying ample opportunities for self-preferencing. Across international Amazon marketplaces, only 0.02% of available offers consist of an Amazon private-label product. However, Amazon is a retailer for around 31% and fulfills around 38% of all available offers in its marketplaces. Hence, self-preferencing on Amazon can occur most frequently through retailing and fulfillment but comparatively infrequently through private-label offers. Still, these shares differ substantially by country – every second offer is vertically integrated in the USA, but only one in ten in India.

Originality/value

Most of the self-preferencing debate often focuses on private-label products. Instead, we present large-scale empirical results showing that self-preferencing on Amazon could occur most often through retailing and fulfillment because these channels affect much larger shares of offers. We also measure the variation of these shares across countries and relate them to regulatory environments.

Details

International Marketing Review, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0265-1335

Keywords

Article
Publication date: 17 May 2023

Sulafa Badi and Mohamed Nasaj

This study aims to assess the essential elements of internal organisational capability that influence the cybersecurity effectiveness of a construction firm. An extended McKinsey…

1093

Abstract

Purpose

This study aims to assess the essential elements of internal organisational capability that influence the cybersecurity effectiveness of a construction firm. An extended McKinsey 7S model is used to analyse the relationship between a construction firm's cybersecurity effectiveness and nine internal capability elements: shared values, strategy, structure, systems, staff, style, skills, relationships with third parties and regulatory compliance.

Design/methodology/approach

Based on a quantitative research strategy, this study collected data through a cross-sectional survey of professionals working in the construction sector in the United Kingdom (UK). The collected data was analysed using descriptive and inferential statistical methods.

Findings

The findings underlined systems, regulatory compliance, staff and third-party relationships as the most significant elements of internal organisational capability influencing a construction firm's cybersecurity effectiveness, organised in order of importance.

Research limitations/implications

Future research possibilities are proposed including the extension of the proposed diagnostic model to consider additional external factors, examining it under varying industrial relationship conditions and developing a dynamic framework that helps improve cybersecurity capability levels while overseeing execution outcomes to ensure success.

Practical implications

The extended McKinsey 7S model can be used as a diagnostic tool to assess the organisation's internal capabilities and evaluate the effectiveness of implemented changes. This can provide specific ways for construction firms to enhance their cybersecurity effectiveness.

Originality/value

This study contributes to the field of cybersecurity in the construction industry by empirically assessing the effectiveness of cybersecurity in UK construction firms using an extended McKinsey 7S model. The study highlights the importance of two additional elements, third-party relationships and construction firm regulatory compliance, which were overlooked in the original McKinsey 7S model. By utilising this model, the study develops a concise research model of essential elements of internal organisational capability that influence cybersecurity effectiveness in construction firms.

Details

Engineering, Construction and Architectural Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0969-9988

Keywords

Article
Publication date: 7 May 2024

Haonan Qi, Zhipeng Zhou, Javier Irizarry, Xiaopeng Deng, Yifan Yang, Nan Li and Jianliang Zhou

This study aims to modify the human factors analysis and classification system (HFACS) to make it suitable for collapse accident analysis in construction. Based upon the modified…

Abstract

Purpose

This study aims to modify the human factors analysis and classification system (HFACS) to make it suitable for collapse accident analysis in construction. Based upon the modified HFACS, distribution patterns of causal factors across multiple levels were discerned among causal factors of various stakeholders at construction sites. It explored the correlations between two causal factors from different levels and further determined causation paths from two perspectives of level and stakeholder.

Design/methodology/approach

The main research framework consisted of data collection, coding and analysis. Collapse accident reports were collected with adequate causation information. The modified HFACS was utilized for coding causal factors across all five levels in each case. A hybrid approach with two perspectives of level and stakeholder was proposed for frequency analysis, correlation analysis and path identification between causal factors.

Findings

Eight causal factors from external organizations at the fifth level were added to the original HFACS. Level-based correlation analyses and path identification provided safety managers with a holistic view of inter-connected causal factors across five levels. Stakeholder-based correlation analyses between causal factors from the fifth level and its non-adjacent levels were implemented based on client, government and third parties. These identified paths were useful for different stakeholders to develop specific safety plans for avoiding construction collapse accidents.

Originality/value

This paper fulfils an identified need to modify and utilize the HFACS model for correlation analysis and path identification of causal factors resulting in collapse accidents, which can provide opportunities for tailoring preventive and protective measures at construction sites.

Details

Engineering, Construction and Architectural Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0969-9988

Keywords

Article
Publication date: 22 June 2022

Shubangini Patil and Rekha Patil

Until now, a lot of research has been done and applied to provide security and original data from one user to another, such as third-party auditing and several schemes for…

Abstract

Purpose

Until now, a lot of research has been done and applied to provide security and original data from one user to another, such as third-party auditing and several schemes for securing the data, such as the generation of the key with the help of encryption algorithms like Rivest–Shamir–Adleman and others. Here are some of the related works that have been done previously. Remote damage control resuscitation (RDCR) scheme by Yan et al. (2017) is proposed based on the minimum bandwidth. By enabling the third party to perform the verification of public integrity. Although it supports the repair management for the corrupt data and tries to recover the original data, in practicality it fails to do so, and thus it takes more computation and communication cost than our proposed system. In a paper by Chen et al. (2015), using broadcast encryption, an idea for cloud storage data sharing has been developed. This technique aims to accomplish both broadcast data and dynamic sharing, allowing users to join and leave a group without affecting the electronic press kit (EPK). In this case, the theoretical notion was true and new, but the system’s practicality and efficiency were not acceptable, and the system’s security was also jeopardised because it proposed adding a member without altering any keys. In this research, an identity-based encryption strategy for data sharing was investigated, as well as key management and metadata techniques to improve model security (Jiang and Guo, 2017). The forward and reverse ciphertext security is supplied here. However, it is more difficult to put into practice, and one of its limitations is that it can only be used for very large amounts of cloud storage. Here, it extends support for dynamic data modification by batch auditing. The important feature of the secure and efficient privacy preserving provable data possession in cloud storage scheme was to support every important feature which includes data dynamics, privacy preservation, batch auditing and blockers verification for an untrusted and an outsourced storage model (Pathare and Chouragadec, 2017). A homomorphic signature mechanism was devised to prevent the usage of the public key certificate, which was based on the new id. This signature system was shown to be resistant to the id attack on the random oracle model and the assault of forged message (Nayak and Tripathy, 2018; Lin et al., 2017). When storing data in a public cloud, one issue is that the data owner must give an enormous number of keys to the users in order for them to access the files. At this place, the knowledge assisted software engineering (KASE) plan was publicly unveiled for the first time. While sharing a huge number of documents, the data owner simply has to supply the specific key to the user, and the user only needs to provide the single trapdoor. Although the concept is innovative, the KASE technique does not apply to the increasingly common manufactured cloud. Cui et al. (2016) claim that as the amount of data grows, distribution management system (DMS) will be unable to handle it. As a result, various proven data possession (PDP) schemes have been developed, and practically all data lacks security. So, here in these certificates, PDP was introduced, which was based on bilinear pairing. Because of its feature of being robust as well as efficient, this is mostly applicable in DMS. The main purpose of this research is to design and implement a secure cloud infrastructure for sharing group data. This research provides an efficient and secure protocol for multiple user data in the cloud, allowing many users to easily share data.

Design/methodology/approach

The methodology and contribution of this paper is given as follows. The major goal of this study is to design and implement a secure cloud infrastructure for sharing group data. This study provides an efficient and secure protocol for multiple user data in cloud, allowing several users to share data without difficulty. The primary purpose of this research is to design and implement a secure cloud infrastructure for sharing group data. This research develops an efficient and secure protocol for multiple user data in the cloud, allowing numerous users to exchange data without difficulty. Selection scheme design (SSD) comprises two algorithms; first algorithm is designed for limited users and algorithm 2 is redesigned for the multiple users. Further, the authors design SSD-security protocol which comprises a three-phase model, namely, Phase 1, Phase 2 and Phase 3. Phase 1 generates the parameters and distributes the private key, the second phase generates the general key for all the users that are available and third phase is designed to prevent the dishonest user to entertain in data sharing.

Findings

Data sharing in cloud computing provides unlimited computational resources and storage to enterprise and individuals; moreover, cloud computing leads to several privacy and security concerns such as fault tolerance, reliability, confidentiality and data integrity. Furthermore, the key consensus mechanism is fundamental cryptographic primitive for secure communication; moreover, motivated by this phenomenon, the authors developed SSDmechanismwhich embraces the multiple users in the data-sharing model.

Originality/value

Files shared in the cloud should be encrypted for security purpose; later these files are decrypted for the users to access the file. Furthermore, the key consensus process is a crucial cryptographic primitive for secure communication; additionally, the authors devised the SSD mechanism, which incorporates numerous users in the data-sharing model, as a result of this phenomena. For evaluation of the SSD method, the authors have considered the ideal environment of the system, that is, the authors have used java as a programming language and eclipse as the integrated drive electronics tool for the proposed model evaluation. Hardware configuration of the model is such that it is packed with 4 GB RAM and i7 processor, the authors have used the PBC library for the pairing operations (PBC Library, 2022). Furthermore, in the following section of this paper, the number of users is varied to compare with the existing methodology RDIC (Li et al., 2020). For the purposes of the SSD-security protocol, a prime number is chosen as the number of users in this work.

Details

International Journal of Pervasive Computing and Communications, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 14 September 2023

Maha Ali Alalawi, Mohammed Muneerali Thottoli, Aisha Hamed Al-Shukaili and Fatema Khamis Al-Amri

This study investigates determinant factors (influence of the third party (ITP), credit policy (CP) and follow-up process (FP)) of micro, small and medium enterprises' (MSMEs…

Abstract

Purpose

This study investigates determinant factors (influence of the third party (ITP), credit policy (CP) and follow-up process (FP)) of micro, small and medium enterprises' (MSMEs) accounting processes (APs) and strategic debtors' management.

Design/methodology/approach

The study employed a sequential mixed-method approach, combining quantitative and qualitative methods for comprehensive data analysis. Phase I involved purposively selecting and interviewing 10 MSME owners or accountants to gain insights into debtors' management. In Phase II, a quantitative approach was used for collecting survey data from 72 MSME owners or accountants. Structural equation modeling-partial least squares (SEM-PLS) are the statistical tools that validated the study's proposed hypotheses.

Findings

The findings indicate that determinant factors (ITP, CP and FP) positively affect MSMEs' AP, significantly influencing strategic debtors' management. As a result, sole proprietors can use this study's findings to create value through systematic management of their debtors, guaranteeing sustainable firm growth and profitability.

Practical implications

The sample has restricted to MSMEs in Oman, where the findings may not be generalized to other companies. Overall, the findings suggest that it requires considering the proposed determinant factor of MSMEs' AP to manage their debtors or accounts receivable (AR) to be more profitable.

Originality/value

MSMEs play an essential role in the growth of any country's economy. However, the dearth of comprehensive research on influential factors of MSMEs' debtors’ management studies justifies the significance of the current study.

Details

Management & Sustainability: An Arab Review, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2752-9819

Keywords

Article
Publication date: 11 June 2024

Aladdin Musleh and Sohail Ahmad

Ijara is one of the exchange contracts that is based on selling benefits and services. There are several forms of Ijara: Ijara specified objects, specified work and hiring a…

Abstract

Purpose

Ijara is one of the exchange contracts that is based on selling benefits and services. There are several forms of Ijara: Ijara specified objects, specified work and hiring a private or joint employee. The target of all these is obtaining a benefit. For instance, in the specified Ijara, the lessee desires to obtain a benefit from a specified person in particular, and in the forward Ijara, the purpose is obtaining the benefit in accordance with specified specifications. Indeed, Islamic banks can obtain these benefits through Ijara them from their providers and re-Ijara them to customers upon request. Hence, the purpose of this paper is to determine the Shariah ruling of the Islamic law of Ijara persons' benefits. Moreover, it aims to determine to what extent is it possible to consider Ijara and selling the benefits prescribed in disclosure and as a financing instrument in Islamic banks aiming at providing citizens with services, mainly in the virtual era.

Design/methodology/approach

The current research is framed within the descriptive and analytical research through illustrating the nature of Ijara, its conditions, pillars, evidence of its legitimacy and its kinds as well. The methodology used attributes the Quranic verses to their contexts in the Holy Quran and authenticates the noble hadiths of the Prophet.

Findings

The current research concludes that it is legally permissible to lease these benefits and re-lease them. However, in the specified Ijara, the hired person must perform the work himself and it is not permissible to be replaced by a third party, whereas in the forward Ijara, the contracted work is permitted to be carried out by a third party as long as it complies with the specifications required and contracted.

Originality/value

This study contributes to the current literature by providing a guide to Islamic banking regulators to promote Ijara in Islamic banking.

Details

Journal of Islamic Marketing, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1759-0833

Keywords

Article
Publication date: 17 April 2024

Vibhav Singh, Niraj Kumar Vishvakarma and Vinod Kumar

E-commerce companies often manipulate customer decisions through dark patterns to meet their interests. Therefore, this study aims to identify, model and rank the enablers behind…

Abstract

Purpose

E-commerce companies often manipulate customer decisions through dark patterns to meet their interests. Therefore, this study aims to identify, model and rank the enablers behind dark patterns usage in e-commerce companies.

Design/methodology/approach

Dark pattern enablers were identified from existing literature and validated by industry experts. Total interpretive structural modeling (TISM) was used to model the enablers. In addition, “matriced impacts croisés multiplication appliquée á un classement” (MICMAC) analysis categorized and ranked the enablers into four groups.

Findings

Partial human command over cognitive biases, fighting market competition and partial human command over emotional triggers were ranked as the most influential enablers of dark patterns in e-commerce companies. At the same time, meeting long-term economic goals was identified as the most challenging enabler of dark patterns, which has the lowest dependency and impact over the other enablers.

Research limitations/implications

TISM results are reliant on the opinion of industry experts. Therefore, alternative statistical approaches could be used for validation.

Practical implications

The insights of this study could be used by business managers to eliminate dark patterns from their platforms and meet the motivations of the enablers of dark patterns with alternate strategies. Furthermore, this research would aid legal agencies and online communities in developing methods to combat dark patterns.

Originality/value

Although a few studies have developed taxonomies and classified dark patterns, to the best of the authors’ knowledge, no study has identified the enablers behind the use of dark patterns by e-commerce organizations. The study further models the enablers and explains the mutual relationships.

Details

Global Knowledge, Memory and Communication, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2514-9342

Keywords

Article
Publication date: 27 March 2024

Haroon Iqbal Maseeh, Charles Jebarajakirthy, Achchuthan Sivapalan, Mitchell Ross and Mehak Rehman

Smartphone apps collect users' personal information, which triggers privacy concerns for app users. Consequently, app users restrict apps from accessing their personal…

200

Abstract

Purpose

Smartphone apps collect users' personal information, which triggers privacy concerns for app users. Consequently, app users restrict apps from accessing their personal information. This may impact the effectiveness of in-app advertising. However, research has not yet demonstrated what factors impact app users' decisions to use apps with restricted permissions. This study is aimed to bridge this gap.

Design/methodology/approach

Using a quantitative research method, the authors collected the data from 384 app users via a structured questionnaire. The data were analysed using AMOS and fuzzy-set qualitative comparative analysis (fsQCA).

Findings

The findings suggest privacy concerns and risks have a significant positive effect on app usage with restricted permissions, whilst reputation, trust and perceived benefits have significant negative impact on it. Some app-related factors, such as the number of apps installed and type of apps, also impact app usage with restricted permissions.

Practical implications

Based on the findings, the authors provided several implications for app stores, app developers and app marketers.

Originality/value

This study examines the factors that influence smartphone users' decisions to use apps with restricted permission requests. By doing this, the authors' study contributes to the consumer behaviour literature in the context of smartphone app usage. Also, by explaining the underlying mechanisms through which the principles of communication privacy management theory operate in smartphone app context, the authors' research contributes to the communication privacy management theory.

Details

Information Technology & People, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0959-3845

Keywords

1 – 10 of over 1000