Search results

1 – 10 of over 2000
Article
Publication date: 23 November 2023

Konstantinos Kalodanis, Panagiotis Rizomiliotis and Dimosthenis Anagnostopoulos

The purpose of this paper is to highlight the key technical challenges that derive from the recently proposed European Artificial Intelligence Act and specifically, to investigate…

Abstract

Purpose

The purpose of this paper is to highlight the key technical challenges that derive from the recently proposed European Artificial Intelligence Act and specifically, to investigate the applicability of the requirements that the AI Act mandates to high-risk AI systems from the perspective of AI security.

Design/methodology/approach

This paper presents the main points of the proposed AI Act, with emphasis on the compliance requirements of high-risk systems. It matches known AI security threats with the relevant technical requirements, it demonstrates the impact that these security threats can have to the AI Act technical requirements and evaluates the applicability of these requirements based on the effectiveness of the existing security protection measures. Finally, the paper highlights the necessity for an integrated framework for AI system evaluation.

Findings

The findings of the EU AI Act technical assessment highlight the gap between the proposed requirements and the available AI security countermeasures as well as the necessity for an AI security evaluation framework.

Originality/value

AI Act, high-risk AI systems, security threats, security countermeasures.

Details

Information & Computer Security, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 8 March 2021

Atif Saleem Butt

This paper explores the steps/countermeasures taken by buying and distributing firms to address supply chain disruptions caused by COVID-19.

10421

Abstract

Purpose

This paper explores the steps/countermeasures taken by buying and distributing firms to address supply chain disruptions caused by COVID-19.

Design/methodology/approach

This study employs a multiple case study methodology and conducts 36 semi-structured interviews with senior managers of nine different firms producing, procuring or distributing products from China and other highly impacted South Asian regions (Pakistan, Sri Lanka, India).

Findings

Results reveal that buying firms are moving to agile production, focusing on tier-1 supplier risk, enhancing inbound material visibility and temporarily closing production facilities to respond to the challenges posed by COVID-19. Furthermore, distribution centres are modifying their inventory policies, evaluating alternative outbound routes and sources of supply to manage disruptions caused to their business operations amid COVID-19 outbreak.

Practical implications

Supply chain firms can use the countermeasures provided in this study to mitigate the impact of COVID-19 and make the best out of this pandemic.

Originality/value

This study contributes to the supply chain literature by exploring the countermeasures taken by firms to mitigate the impact of COVID-19. In particular, this study explores such countermeasures from the perspective of two different entities (buyers and distributors) along the supply chain. Firms can use the countermeasures highlighted in this study to mitigate the impact of COVID-19 on the supply chain.

Details

The International Journal of Logistics Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0957-4093

Keywords

Article
Publication date: 17 April 2024

Jayne M. Leh

Groups of students were enrolled in a course that sought to produce a three-phase theoretical model over three semesters.

Abstract

Purpose

Groups of students were enrolled in a course that sought to produce a three-phase theoretical model over three semesters.

Design/methodology/approach

A design project to comprehensively address school violence was launched at a university in eastern Pennsylvania.

Findings

This article updates the recent and most critical finding of the project by illuminating specific implications of the importance of teacher training and the development toward competence in recognition of children who are emotionally and psychologically injured through proactive measures such as screening for emotional and psychological well-being.

Research limitations/implications

Although the model has not been tested, screening to identify those in need of emotional support and training to support teachers is clear. Screening and training offer important opportunities to help learners build skills toward resilience to soften the effects of trauma.

Practical implications

A view of the “whole child” with regard to academic success could further foster social and emotional development.

Social implications

Early intervention can prevent the onset of symptoms associated with posttraumatic stress and related disorders. This effort alone may significantly reduce the uncomfortable incidences and perhaps ultimate prevention of the violence that is perpetuated among children.

Originality/value

Preliminary research supports a continued conversation regarding effective tools to find children emotionally and psychologically at-risk, which allows teachers an opportunity for timely emotional and psychological interventions.

Details

Journal of Applied Research in Higher Education, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2050-7003

Keywords

Article
Publication date: 5 April 2024

Manoj Krishnan and Satish Krishnan

The study aims to drive conceptual clarity around resistance to information technology projects, integrating multiple facets of the phenomenon from earlier studies.

Abstract

Purpose

The study aims to drive conceptual clarity around resistance to information technology projects, integrating multiple facets of the phenomenon from earlier studies.

Design/methodology/approach

The study conducts a meta-synthesis of qualitative studies on resistance to technology projects; it analyzes those studies at a case-specific level, compares and contrasts emergent concepts against each other, and “translates” those to the rest of the studies. The study uses the seven-step meta-ethnography method by Noblit and Hare to reciprocally translate emergent concepts to construct the conceptual model.

Findings

Through meta-synthesis, the study derives a new conceptual model for resistance to information technology projects, exemplifying how the identified antecedents create user resistance and how the phenomenon progresses within organizations.

Research limitations/implications

This study enriches the observations and conclusions of past individual studies while explicating various facets of the mechanisms that generate and progress technology resistance within organizations. It offers fresh insights into the equivocal nature of the phenomenon and the distinctive ways it progresses from individual to group level.

Practical implications

Many ambitious and costly digital transformation efforts do not succeed due to user resistance. Understanding the mechanisms that create user resistance can help organizations manage technology projects better, thereby reducing the technology assimilation gap and protecting returns on related investments.

Originality/value

There have been extensive studies on technology acceptance (enablers) within organizations, while those relating to technology inhibitors are somewhat limited. However, the symmetry of understanding between enablers and inhibitors is vital for organizations to assimilate promising technologies and transform their business models. This model uses a new lens of sensemaking theory to explain how the antecedents trigger perceived threats and resistance behavior; it highlights the nuances around the development of resistance within individuals and its progression to groups. The resultant model offers better generalizability in organizational contexts.

Details

Information Technology & People, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 4 March 2024

Betul Gokkaya, Erisa Karafili, Leonardo Aniello and Basel Halak

The purpose of this study is to increase awareness of current supply chain (SC) security-related issues by providing an extensive analysis of existing SC security solutions and…

Abstract

Purpose

The purpose of this study is to increase awareness of current supply chain (SC) security-related issues by providing an extensive analysis of existing SC security solutions and their limitations. The security of SCs has received increasing attention from researchers, due to the emerging risks associated with their distributed nature. The increase in risk in SCs comes from threats that are inherently similar regardless of the type of SC, thus, requiring similar defence mechanisms. Being able to identify the types of threats will help developers to build effective defences.

Design/methodology/approach

In this work, we provide an analysis of the threats, possible attacks and traceability solutions for SCs, and highlight outstanding problems. Through a comprehensive literature review (2015–2021), we analysed various SC security solutions, focussing on tracking solutions. In particular, we focus on three types of SCs: digital, food and pharmaceutical that are considered prime targets for cyberattacks. We introduce a systematic categorization of threats and discuss emerging solutions for prevention and mitigation.

Findings

Our study shows that the current traceability solutions for SC systems do not offer a broadened security analysis and fail to provide extensive protection against cyberattacks. Furthermore, global SCs face common challenges, as there are still unresolved issues, especially those related to the increasing SC complexity and interconnectivity, where cyberattacks are spread across suppliers.

Originality/value

This is the first time that a systematic categorization of general threats for SC is made based on an existing threat model for hardware SC.

Details

Benchmarking: An International Journal, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1463-5771

Keywords

Article
Publication date: 2 April 2024

Mahmoud Mawed

The UAE is among the fastest-growing facilities management (FM) markets globally. Nevertheless, conclusive evidence on this market is scarce in the literature. Therefore, this…

Abstract

Purpose

The UAE is among the fastest-growing facilities management (FM) markets globally. Nevertheless, conclusive evidence on this market is scarce in the literature. Therefore, this paper aims to provide an in-depth insight into the FM market in the UAE.

Design/methodology/approach

Fourteen interviewees were purposively selected to provide insight into FM status through their field experiences. A SWOT analysis of their answers held place.

Findings

Interviewees revealed that the main trends of FM in the UAE include interests in sustainability, integration of technology, health and safety, outsourcing FM, switching to total facilities management (TFM), and performance management systems use. Besides, the quality of the service in the FM market is driven by the real-estate boom, services sophistication, the increasing awareness of FM and focus on the quality of services. Furthermore, the interviews found that the recruitment of poorly skilled labors can threaten the FM market to meet the allocated budget, misperception of FM, the value of money, the lack of continuous follow-up with recent advancements in technologies and the lack of performance measurement models.

Originality/value

This paper highlights the major trends, drivers and threats of the FM market in the UAE, and the implications of its findings can direct FM organizations and researchers in their practices.

Article
Publication date: 29 August 2023

Yanhua Ye, Pei Liu and Linghan Zhang

Despite extensive research on the detrimental work-related impact of customer mistreatment, there has been limited investigation into the outcomes that encompass both positive and…

Abstract

Purpose

Despite extensive research on the detrimental work-related impact of customer mistreatment, there has been limited investigation into the outcomes that encompass both positive and negative connotations (i.e. unethical pro-organizational behavior [UPB]). This study aims to test whether, how and when daily customer mistreatment leads to hospitality employees’ daily UPB.

Design/methodology/approach

This study conducted a two-phase daily diary study. In the first phase, participants completed measures of their sense of power and provided demographic information. During the subsequent two-week period, participants completed questionnaires twice daily. The analysis included data from 87 hospitality employees, with 781 surveys remaining. This study performed multilevel analyses using Monte–Carlo simulations.

Findings

This study revealed that hospitality employees experiencing daily customer mistreatment exhibited heightened perceptions of status threats, resulting in increased daily UPB. The moderating effects of employees’ sense of power were found to be significant in both direct and indirect relationships.

Practical implications

Hospitality managers should recognize that customer mistreatment can threaten employees’ social status and result in daily UPB. To protect employees, implementing daily training programs is essential. Moreover, hotels and managers should provide HR management/recognition programs and empowerment initiatives to boost employees’ sense of power and counteract the harmful effects of customer mistreatment on their status.

Originality/value

This study makes contributions to the existing literature on customer mistreatment by establishing a positive relationship between daily customer mistreatment and daily UPB through the mechanism of status threat. Furthermore, thise study highlights the importance of enhancing hospitality employees’ sense of power as a protective factor against the negative consequences of customer mistreatment.

Details

International Journal of Contemporary Hospitality Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0959-6119

Keywords

Article
Publication date: 17 April 2024

Hassan Jamil, Tanveer Zia, Tahmid Nayeem, Monica T. Whitty and Steven D'Alessandro

The current advancements in technologies and the internet industry provide users with many innovative digital devices for entertainment, communication and trade. However…

Abstract

Purpose

The current advancements in technologies and the internet industry provide users with many innovative digital devices for entertainment, communication and trade. However, simultaneous development and the rising sophistication of cybercrimes bring new challenges. Micro businesses use technology like how people use it at home, but face higher cyber risks during riskier transactions, with human error playing a significant role. Moreover, information security researchers have often studied individuals’ adherence to compliance behaviour in response to cyber threats. The study aims to examine the protection motivation theory (PMT)-based model to understand individuals’ tendency to adopt secure behaviours.

Design/methodology/approach

The study focuses on Australian micro businesses since they are more susceptible to cyberattacks due to the least security measures in place. Out of 877 questionnaires distributed online to Australian micro business owners through survey panel provider “Dynata,” 502 (N = 502) complete responses were included. Structural equational modelling was used to analyse the relationships among the variables.

Findings

The results indicate that all constructs of the protection motivation, except threat susceptibility, successfully predict the user protective behaviours. Also, increased cybersecurity costs negatively impact users’ safe cyber practices.

Originality/value

The study has critical implications for understanding micro business owners’ cyber security behaviours. The study contributes to the current knowledge of cyber security in micro businesses through the lens of PMT.

Details

Information & Computer Security, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 25 April 2023

Jie Huang, Chunyong Tang and Yali Li

This research aims to present the results of a study that operationalizes the construct of perceived work identity deprivation (PWID) and examines its validity.

Abstract

Purpose

This research aims to present the results of a study that operationalizes the construct of perceived work identity deprivation (PWID) and examines its validity.

Design/methodology/approach

The authors adopted a mixed method design in this study where a Likert-type scale to measure PWID was developed based on the interviews of 40 workers and the questionnaires of 625 participants successively. Later, the generalizability of the scale was tested through quantitative data from 412 workers. Finally, validity analysis was conducted based on 380 usable questionnaires. Data were analyzed using IBM SPSS 24 and Mplus 7.0.

Findings

The findings of the study indicate that the reliability measures, exploratory factor analyses, confirmatory factor analysis and subsequent convergent and discriminant validity tests support the PWID scale. The nomological validity of PWID is also presented, which demonstrates its predictive validity.

Originality/value

Despite highlighting the importance of work identity, prior research lacked to provide empirical foundations to understand this perception. This study fills this gap in the literature by providing a measure of PWID, distinguishing it from similar constructs and establishing convergent, discriminant and nomological validity. Moreover, by extending the range of theoretical and measurable deprivation of work identity, the authors hope to allow research to take into account a more complete picture of it. PWID scale can be used to develop more relevant suppression plans.

Details

Chinese Management Studies, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1750-614X

Keywords

Article
Publication date: 30 March 2023

Maayan Nakash and Dan Bouhnik

This research seeks to understand, for the first time, what motivates knowledge-intensive organizations (KIOs) to initiate knowledge management (KM) activities in times of routine…

Abstract

Purpose

This research seeks to understand, for the first time, what motivates knowledge-intensive organizations (KIOs) to initiate knowledge management (KM) activities in times of routine and emergency. The COVID-19 pandemic was placed at the center as a case study of an extreme crisis.

Design/methodology/approach

Based on the adoption of the qualitative-constructivist paradigm, the study was conducted among 52 KM professionals through in-depth interviews and focus groups. The data were analyzed using a thematic analysis method, according to the principles of the grounded theory approach.

Findings

The findings reveal that opportunities and risks are two types of catalysts which accelerate KM efforts in times of routine and emergency respectively. Due to KM’s support of the transition to flexible employment during COVID-19, the authors show that this field experienced real growth and prosperity in the “new normal.” KM initiatives were promoted during the COVID-19 crisis in light of gaps in retention, sharing, accessibility and development of knowledge.

Originality/value

Given that knowledge risks are a field with fragmented understanding, the results contribute to understanding the importance of risk management related to knowledge in times of crises and turmoil. The authors call for incorporating this niche into the overall risk management of the organization, while adopting a holistic and long-term perspective of KM. Furthermore, the authors uncover KM’s position in KIOs during the global pandemic. The paper proposes food for thought regarding informal knowledge sharing in virtual environments typical of the “Corona routine”.

Details

Aslib Journal of Information Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2050-3806

Keywords

1 – 10 of over 2000