Search results

1 – 10 of 595
Open Access
Article
Publication date: 22 August 2023

Anna McGlynn, Éidín Ní Shé, Paul Bennett, Siaw-Teng Liaw, Tony Jackson and Ben Harris-Roxas

HealthPathways is an online decision support portal, primarily aimed at General Practitioners (GPs), that provides easy to access and up to date clinical, referral and resource…

Abstract

Purpose

HealthPathways is an online decision support portal, primarily aimed at General Practitioners (GPs), that provides easy to access and up to date clinical, referral and resource pathways. It is free to access, with the intent of providing the right care, at the right place, at the right time. This case study focuses on the experience and learnings of a HealthPathways program in metropolitan Sydney during the COVID-19 pandemic. It reviews the team's program management responses and looks at key factors that have facilitated the spread and scale of HealthPathways.

Design/methodology/approach

Available data and experiences of two HealthPathways program managers were used to recount events and aspects influencing spread and scale.

Findings

The key factors for successful spread and scale are a coordinated response, the maturity of the HealthPathways program, having a single source of truth, high level governance, leadership, collaboration, flexible funding and ability to make local changes where required.

Originality/value

There are limited published articles on HealthPathways. The focus of spread and scale of HealthPathways during COVID-19 is unique.

Details

Journal of Integrated Care, vol. 31 no. 4
Type: Research Article
ISSN: 1476-9018

Keywords

Open Access
Article
Publication date: 19 January 2024

Teerapong Teangsompong, Pichaporn Yamapewan and Weerachon Sawangproh

This study aims to investigate the impact of service quality (SQ), perceived value (PV) and consumer satisfaction on Thai street food, with customer satisfaction (CS) as a…

1886

Abstract

Purpose

This study aims to investigate the impact of service quality (SQ), perceived value (PV) and consumer satisfaction on Thai street food, with customer satisfaction (CS) as a mediator for customer loyalty and repurchase intention (RI). It also explores how consumer trust (CT) in Thai street food safety moderates these relationships.

Design/methodology/approach

Structural equation modelling (SEM) was utilised to analyse the complex interrelationships between various constructs. Multi-group analyses were conducted to investigate the moderating effects of CT on the structural model, considering two distinct groups based on trust levels: low and high.

Findings

The findings revealed that SQ and PV significantly influenced CS and behavioural intention, while the perceived quality of Thai street food had no significant impact on post-COVID-19 consumer satisfaction. The study highlighted the critical role of CT in moderating the relationships between SQ, PV and CS, with distinct effects observed in groups with varying trust levels.

Social implications

The research emphasises the importance of enhancing SQ and delivering value to customers in the context of Thai street food, which can contribute to increased CS, RI and positive word-of-mouth. Furthermore, the study underscores the critical role of building CT in fostering enduring customer relationships and promoting consumer satisfaction and loyalty.

Originality/value

This research offers valuable insights into consumer behaviour and decision-making processes, particularly within the realm of Thai street food. It underscores the significance of understanding and nurturing CT, especially in the post-COVID-19 landscape, emphasising the need for effective business strategies and consumer engagement.

Details

International Journal of Sociology and Social Policy, vol. 44 no. 13/14
Type: Research Article
ISSN: 0144-333X

Keywords

Open Access
Article
Publication date: 31 May 2023

Antti Ylä-Kujala, Damian Kedziora, Lasse Metso, Timo Kärri, Ari Happonen and Wojciech Piotrowicz

Robotic process automation (RPA) has recently emerged as a technology focusing on the automation of repetitive, frequent, voluminous and rule-based tasks. Despite a few practical…

1975

Abstract

Purpose

Robotic process automation (RPA) has recently emerged as a technology focusing on the automation of repetitive, frequent, voluminous and rule-based tasks. Despite a few practical examples that document successful RPA deployments in organizations, evidence of its economic benefits has been mostly anecdotal. The purpose of this paper is to present a step-by-step method to RPA investment appraisal and a business case demonstrating how the steps can be applied to practice.

Design/methodology/approach

The methodology relies on design science research (DSR). The step-by-step method is a design artefact that builds on the mapping of processes and modelling of the associated costs. Due to the longitudinal nature of capital investments, modelling uses discounted cashflow and present value methods. Empirical grounding characteristic to DSR is achieved by field testing the artefact.

Findings

The step-by-step method is comprised of a preparatory step, three modelling steps and a concluding step. The modelling consists of compounding the interest rate, discounting the investment costs and establishing measures for comparison. These steps were applied to seven business processes to be automated by the case company, Estate Blend. The decision to deploy RPA was found to be trivial, not only based on the initial case data, but also based on multiple sensitivity analyses that showed how resistant RPA investments are to changing circumstances.

Practical implications

By following the provided step-by-step method, executives and managers can quantify the costs and benefits of RPA. The developed method enables any organization to directly compare investment alternatives against each other and against the probable status quo where many tasks in organizations are still carried out manually with little to no automation.

Originality/value

The paper addresses a growing new domain in the field of business process management by capitalizing on DSR and modelling-based approaches to RPA investment appraisal.

Details

Business Process Management Journal, vol. 29 no. 8
Type: Research Article
ISSN: 1463-7154

Keywords

Open Access
Article
Publication date: 13 February 2023

Atul Kumar Sahu, Abhijeet Katyayan, Umesh Khandey, Prashant Jangde, Anoop Kumar Sahu and Nitin Kumar Sahu

Block chain technology (BCT) has apparent capability of handling information in digital format, which has dragged attention of the practitioners for its utility in industrial and…

Abstract

Purpose

Block chain technology (BCT) has apparent capability of handling information in digital format, which has dragged attention of the practitioners for its utility in industrial and manufacturing practices. Conversely, the managerial adoption of BCT is relatively limited, which motivated the authors to identify crucial dimensions that can persuade the acceptance of BCT from an executive perspective. Thus, the present study is aimed to conduct to understand crucial barriers under BCT for managerial implementation in supply chain management (SCM) of small and medium enterprises (SMEs).

Design/methodology/approach

The present study investigated evident barriers to understand implementation of BCT. A questionnaire based survey is performed to collect primary data from service and manufacturing based companies in India. Survey responses are received online and the data is analyzed in a scorecard. The scorecard embedded the scribed entries of Likert scale to determine the relative score.

Findings

In present study, sixteen barriers from three categories named as technological, organizational and environmental are evaluated, where, five sub-barriers from technological domain, seven sub-barriers from organizational domain and four sub-barriers from environmental domain are evaluated. The findings of the study determined that the three factors, i.e. “complexity in setup/use”, “Security and privacy concern” and “Technological awareness” mostly affect the adaptation of BCT in SCM. Conversely, “Market dynamics”, “Scalability” and “Cost” do not influence the intention to adopt the technology.

Originality/value

Only few studies have endeavored to ascertain the BCT adoption in SCM of SMEs in developing country like India. Thus, the study is filling a momentous gap of mapping BCT dimensions in the scholastic literature. The findings are expected to enable SMEs to understand important factors to be considered for adopting BCT in their curriculum. Furthermore, the study may benefit the BCT developers and suppliers to endure customized solutions based on the findings.

Details

Journal of International Logistics and Trade, vol. 21 no. 1
Type: Research Article
ISSN: 1738-2122

Keywords

Open Access
Book part
Publication date: 16 August 2023

Meropi Tzanetakis and Stefan A. Marx

This chapter examines how darknet drug marketplaces operate within platform capitalism. While capitalist power relations remain underexplored in research on digital drug markets…

Abstract

This chapter examines how darknet drug marketplaces operate within platform capitalism. While capitalist power relations remain underexplored in research on digital drug markets, the analysis shows that the basic foundation of cryptomarkets relies on the infrastructure of platform capitalism. The authors use the concept of platform capitalism to explore cryptomarkets in an ideology-critical way. Platforms are infrastructure for the mediation of buyers and vendors; however, they are designed to extract data on the activities of their users. Platform capitalism refers to the process by which the vast collection of user data feeds into the accumulation of capital. The authors use a dialectical method to examine the constellation of digital drug platforms by disclosing a threefold contradiction: state control and self-regulation; visibility and concealment; and legality and illegality. The analysis reveals that darknet drug platforms make a profit not only from the trade of illicit drugs and the collection of user data, but also based on the illegal status of drugs, the associated ideology, and the closed ecology of darknet platforms. Power relations in cryptomarkets thereby mimic those observed in platform capitalism in general. Finally, the authors discuss the implications of platform capitalism for online drug markets.

Details

Digital Transformations of Illicit Drug Markets: Reconfiguration and Continuity
Type: Book
ISBN: 978-1-80043-866-8

Keywords

Open Access
Article
Publication date: 9 August 2023

Xin (Robert) Luo and Fang-Kai Chang

The purpose of this study is to demonstrate that Strategic Enterprise Management (SEM) and Business Intelligence (BI) have the potential to integrate management decisions…

Abstract

Purpose

The purpose of this study is to demonstrate that Strategic Enterprise Management (SEM) and Business Intelligence (BI) have the potential to integrate management decisions vertically through an organization’s hierarchy. This study also aims to present a design theory framework and build a model dimension using eight principles serving as mid-range theories.

Design/methodology/approach

This study uses a design science perspective to posit how organizations can successfully implement SEMBI (a union of SEM and BI). This study then completes the design theory by building the method dimension using two principles. Finally, the study presents testable hypotheses for the theory and an evaluation using stakeholder attitudes and judgments as proxies for objective measures.

Findings

In the search for a prescription for SEMBI success, this study finds that the notion of the Capability Maturity Model (CMM) is a good artifact with which to organize the principles the authors are seeking. CMM has since been adapted to suit different contexts by incorporating relevant principles from those domains. Hereafter, this study refers to SEMBI–CMM as the adapted solution for SEMBI's success.

Originality/value

This study coins and uses the term SEMBI to represent the union of SEM and BI. This term retains its distinct identities and principles and forms a holistic and integrated view of SEM and BI implementation strategies. In an effort to advance this line of research, this study employs a design science perspective to address the question of how an organization can successfully implement SEMBI.

Details

Journal of Electronic Business & Digital Economics, vol. 2 no. 2
Type: Research Article
ISSN: 2754-4214

Keywords

Open Access
Article
Publication date: 30 October 2018

Hairul Azlan Annuar, Khadijah Isa, Salihu Aramide Ibrahim and Sakiru Adsebola Solarin

The present study aims to investigate the impact of the reduction of the corporate tax rate on corporate tax revenue. The study adopts the theory of taxation by Ibn Khaldun…

5699

Abstract

Purpose

The present study aims to investigate the impact of the reduction of the corporate tax rate on corporate tax revenue. The study adopts the theory of taxation by Ibn Khaldun, depicted as the Laffer curve.

Design/methodology/approach

The paper analyses time series data for the period 1996 to 2014 using the autoregressive distributed lag (ARDL) approach.

Findings

The paper finds that the corporate tax rate has a dual effect on corporate tax revenue over the study period. It shows an inverted U-shape relationship between the corporate tax rate and corporate tax revenue and reveals that the optimal tax rate is 25.5156 per cent. Inferentially, a positive relationship exists between the two variables prior to the optimal tax rate, and a negative relationship prevails afterwards. A further test of causality shows a long-run unidirectional causality between corporate tax rate and corporate tax revenue.

Research limitations/implications

First, it should be noted that the policy was not implemented in isolation. Several other tax incentives were given to corporate tax payers, and therefore, such incentives should be controlled for to have a more insightful evaluation of the policy. Second and most important, there is a need to investigate whether the increased cash flow available to firms as a result of the reduction in the corporate tax rate adds value to firms. It is also necessary to investigate whether firms’ stakeholders benefited from the increased cash flow or was there managerial diversion of firms’ resources.

Practical implications

The policy of gradual reduction of the corporate tax rate in Malaysia is suspected to have a positive impact on the productivity of Malaysian companies, which has contributed to an increase in corporate tax revenue. It also has a positive impact on the economic growth of the country. It means that the lower corporate tax rate has actually reduced the cost of doing business in the country.

Originality/value

The benefit of increased corporate tax revenue needs to be investigated empirically for insightful policy evaluation. In Malaysia, however, such investigation is close to non-existent to the best knowledge of the researchers. Thus, the present study aims at investigating the impact of the policy of gradual reduction of the corporate tax rate on corporate tax revenue over an 18-year period from 1996 to 2014.

Details

ISRA International Journal of Islamic Finance, vol. 10 no. 2
Type: Research Article
ISSN: 0128-1976

Keywords

Open Access
Article
Publication date: 30 December 2022

Durga Prasad Dube and Rajendra Prasad Mohanty

As evident from the literature review, the research on cyber security performance is centered on security metrics, maturity models, etc. Essentially, all these are helpful for…

1606

Abstract

Purpose

As evident from the literature review, the research on cyber security performance is centered on security metrics, maturity models, etc. Essentially, all these are helpful for evaluating the efficiency of cyber security organization but what matters is how the factors of internal efficiency affect the business performance, i.e. the external effectiveness. The purpose of this research paper is to derive the factors of internal efficiency and external effectiveness of cyber security and develop impact model to identify the most and least preferred parameters of internal efficiency with respect to all the parameters of external effectiveness.

Design/methodology/approach

There are two objectives for this research: Deriving the factors of internal efficiency and external effectiveness of cyber security; Developing a model to identify the impact of internal efficiency factors on the external effectiveness of cyber security since there is not much evidence of research in defining the factors of internal efficiency and external effectiveness of cyber security, the authors have chosen grounded theory methodology (GTM) to derive the parameters. In this study emic approach of GTM is followed and an algorithm is developed for administering the grounded theory research process. For the second research objective survey methodology and rank order was used to formulate the impact model. Two different samples and questionnaires were designed for each of the objectives.

Findings

For the objective 1, 11 factors of efficiency and 10 factors of effectiveness were derived. These are used as independent and dependent variable respectively in the later part of the research for the second objective. For the objective 2 the impact models among independent and dependent variables were formulated to find out the following. Most and least preferred parameters lead to internal efficiency of cyber security organization to identify the most and least preferred parameters of internal efficiency with respect to all the parameters external effectiveness.

Research limitations/implications

The factors of internal efficiency and external effectiveness constructed by using grounded theory cannot remain constant in the long run, because of dynamism of the domain itself. Over and above this, there are inherent limitations of the tools like grounded theory, used in the research. Few important limitations of GTM are as below in grounded theory, it is comparatively difficult to maintain and demonstrate the rigors of research discipline. The sheer volume of data makes the analysis and interpretation complex, and lengthy time consuming. The researchers’ presence during data gathering, which is often unavoidable and desirable too in qualitative research, may affect the subjects’ responses. The subjectivity of the data leads to difficulties in establishing reliability and validity of approaches and information. It is difficult to detect or to prevent researcher-induced bias.

Practical implications

The internal efficiency and external effectiveness factors of cyber security can be further correlated by the future researchers to understand the correlations among all the factors and predict cyber security performance. The grounded theory algorithm developed by us can be further used for qualitative research for deriving theory through abstractions in the areas where there is no sufficient availability of data. Practitioners of cyber security can use this research to focus on relevant areas depending on their respective business objective/requirements. The models developed by us can be used by the future researchers to for various sectoral validations and correlations.

Social implications

Though the financial costs of a cyber-attack are steep, the social impact of cyber security failures is less readily apparent but can cause lasting damage to customers, employees and the company. Therefore, it is always important to be mindful of how the impact of cyber security affects society as well as the bottom line when they are calculating the potential impact of a breach. Underestimating either impact can destroy a brand. The factor of internal efficiency and external effectiveness derived by us will help stakeholder in focusing on relevant area depending on their business. The impact model developed in this research is very useful for focusing a particular business requirement and accordingly tune the efficiency factor.

Originality/value

During literature study the authors did not find any evidence of application of grounded theory approach in cyber security research. While the authors were exploring research literature to find out some insight into the factor of internal efficiency and external effectiveness of cyber security, the authors did not find concrete and objective research on this. This motivated us to use grounded theory to derive these factors. This, in the authors’ opinion is one of the pioneering and unique contribution to the research as to the authors’ knowledge no researchers have ever tried to use this methodology for the stated purpose and cyber security domain in general. In this process the authors have also developed an algorithm for administering GTM. Further developing impact models using factors of internal efficiency and external effectiveness has lots of managerial and practical implication.

Details

Organizational Cybersecurity Journal: Practice, Process and People, vol. 3 no. 1
Type: Research Article
ISSN: 2635-0270

Keywords

Open Access
Article
Publication date: 30 March 2022

Pien Walraven, Rogier van de Wetering, Remko Helms, Marjolein Caniëls and Johan Versendaal

Advanced Electronic Medical Records (EMR) provide many potential benefits to hospitals. However, because of their broad scope, many stakeholders deal with the EMR and a continuous…

1487

Abstract

Purpose

Advanced Electronic Medical Records (EMR) provide many potential benefits to hospitals. However, because of their broad scope, many stakeholders deal with the EMR and a continuous effort has to be made to keep up with internal and external change. Therefore, hospitals need to deliberately shape their organizational competencies considering the pursuit of alignment, i.e. making sure that the EMR remains optimally aligned with strategies, goals and needs of the hospital and its stakeholders. This paper aims to investigate the evolutionary paths of these alignment competencies and their drivers, from a theoretical perspective of co-evolutionary information systems alignment (COISA).

Design/methodology/approach

This paper reports on a longitudinal multiple case study of three Dutch hospitals which each recently implemented an advanced EMR system. The authors conducted 35 in-depth interviews in 2 phases (before and after go-live of the EMR), and studied documentation related to the EMR implementations.

Findings

The findings show that each hospital's COISA capability shows a different evolutionary path. However, two of the three case hospitals ended up coordinating part of their COISA capability to an ecosystem level, i.e. they incorporated other hospitals using the same EMR system to coordinate their alignment efforts, either from an operational perspective, or in terms of orchestration and strategy. The found evolutionary paths' key drivers include “stakeholder initiative”, “accumulating experience”, “driving events” and “emerging issues”.

Originality/value

The findings help healthcare practitioners to deliberately shape their organization's COISA capability in pursuit of EMR alignment. Furthermore, the authors add to the knowledge base on co-evolutionary approaches to alignment through the longitudinal approach.

Details

Journal of Health Organization and Management, vol. 36 no. 9
Type: Research Article
ISSN: 1477-7266

Keywords

Open Access
Article
Publication date: 25 December 2023

Vicki Catherine Waye, Collette Snowden, Jane Knowler, Paula Zito, Jack Burton and Joe McIntyre

The purpose of this paper is to examine whether mandatory disclosure of information accompanying the sale of real estate achieves its aim of informed purchasers.

Abstract

Purpose

The purpose of this paper is to examine whether mandatory disclosure of information accompanying the sale of real estate achieves its aim of informed purchasers.

Design/methodology/approach

Using a case study approach focused on mandatory disclosure in South Australia data was collected from interviews and focus groups with key personnel in the property industry involved in the production of information required to fulfil vendors’ disclosure obligations.

Findings

The authors found that purchasers are ill-served by a long and complex form of mandatory disclosure with a short time frame that prevents the use of the information provided. Without good form design and increased digital affordances provided by the cadastral and conveyancing systems, mandatory disclosure is insufficient to ensure minimisation of information asymmetry between vendor and purchaser.

Originality/value

To the best of the authors’ knowledge, this is the first Australian qualitative study that examines the utility of mandatory vendor disclosure in real estate sales and the first to consider the impact of the digitalisation of cadastral and conveyancing systems upon the efficacy of mandatory disclosure regimes.

Details

Journal of Property, Planning and Environmental Law, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2514-9407

Keywords

1 – 10 of 595