Search results
1 – 10 of 66Md. Siddique E. Azam, Anis Najiha Ahmad and Haruna Babatunde Jaiyeoba
The purpose of the study is to measure the performance level of halal compliance practices by the halal-certified restaurants in Malaysia and rank and rate them based on several…
Abstract
Purpose
The purpose of the study is to measure the performance level of halal compliance practices by the halal-certified restaurants in Malaysia and rank and rate them based on several dimensions of halal compliance.
Design/methodology/approach
A total of 320 halal restaurants were surveyed. The absolute measurement approach of the analytic hierarchy process (AHP) was applied to rank and rate the restaurants. Finally, ANOVA and independent t-test were applied to assess if there is any significant difference in halal compliance performance between different groups of the respondents.
Findings
The AHP application resulted in only 19 restaurants (5.94%) achieving an “Excellent” rating. A significant difference has been observed between different groups of the respondents regarding their halal compliance performance.
Research limitations/implications
An onsite audit and ranking of all the restaurants in Malaysia were beyond the scope of the study. The research was able to rank only 320 restaurants across Malaysia.
Practical implications
The findings and methodology of the study will provide policymakers with a clear roadmap for establishing a comprehensive rating system in the fields of the halal food industry to enhance the quality and integrity of the halal food management system.
Originality/value
To the best of the authors’ knowledge, this is the first time an empirical approach, like AHP, has been used to determine how Malaysia’s halal-certified restaurants stack up against one another. Similar studies can be carried out in other sectors of the halal industry as well as in similar context.
Details
Keywords
The article addresses the optimization of safety stock service levels for parts in a repair kit. The work was undertaken to assist a public transit entity that stores thousands of…
Abstract
Purpose
The article addresses the optimization of safety stock service levels for parts in a repair kit. The work was undertaken to assist a public transit entity that stores thousands of parts used to repair equipment acquired over many decades. Demand is intermittent, procurement lead times are long, and the total inventory investment is significant.
Design/methodology/approach
Demand exists for repair kits, and a repair cannot start until all required parts are available. The cost model includes holding cost to carry the part being modeled as well as shortage cost that consists of the holding cost to carry all other repair kit parts for the duration of the part’s lead time. The model combines deterministic and stochastic approaches by assuming a fixed ordering cycle with Poisson demand.
Findings
The results show that optimal service levels vary as a function of repair demand rate, part lead time, and cost of the part as a percentage of the total part cost for the repair kit. Optimal service levels are higher for inexpensive parts and lower for expensive parts, although the precise levels are impacted by repair demand and part lead time.
Social implications
The proposed model can impact society by improving the operational performance and efficiency of public transit systems, by ensuring that home repair technicians will be prepared for repair tasks, and by reducing the environmental impact of electronic waste consistent with the right-to-repair movement.
Originality/value
The optimization model is unique because (1) it quantifies shortage cost as the cost of unnecessary holding other parts in the repair kit during the shortage time, and (2) it determines a unique service level for each part in a repair kit bases on its lead time, its unit cost, and the total cost of all parts in the repair kit. Results will be counter-intuitive for many inventory managers who would assume that more critical parts should have higher service levels.
Details
Keywords
Aldo Salinas and Cristian Ortiz
The purpose of this study is to examine the relationship between the productive structure and the size of the informal economy in Latin American countries.
Abstract
Purpose
The purpose of this study is to examine the relationship between the productive structure and the size of the informal economy in Latin American countries.
Design/methodology/approach
The study employs econometric techniques for panel data covering the period from 2002 to 2017 and considering 17 Latin American countries. The evidence presented is based on the informal economy data generated by Medina and Schneider (2018) who estimate the size of the informal economy using a structural equation model and the share of manufacturing in total employment as a measure of the size of the manufacturing sector. Also, the study addresses the possible endogeneity bias in the relationship studied and makes the conclusions more robust, thus avoiding spurious correlations that weaken the findings.
Findings
The results indicate that most industrialized Latin American countries are associated with a smaller size of the informal economy.
Practical implications
The findings have important policy implications, as they suggest that Latin American economies need to switch the structure of the economy toward more sophisticated productive structures if they want to reduce the size of the informal economy. Thus, more efforts should be deployed to policies to diversify and upgrade economies.
Originality/value
The study contributes to the literature on the informal economy by connecting the country’s productive structure and informality. Specifically, the results show that the productive structure of countries is a plausible explanation for the size of the informal economy.
Details
Keywords
Călin Mihail Rangu, Leonardo Badea, Mircea Constantin Scheau, Larisa Găbudeanu, Iulian Panait and Valentin Radu
In recent years, the frequency and severity of cybersecurity incidents have prompted customers to seek out specialized insurance products. However, this has also presented…
Abstract
Purpose
In recent years, the frequency and severity of cybersecurity incidents have prompted customers to seek out specialized insurance products. However, this has also presented insurers with operational challenges and increased costs. The assessment of risks for health systems and cyber–physical systems (CPS) necessitates a heightened degree of attention. The significant values of potential damages and claims request a solid insurance system, part of cyber-resilience. This research paper focuses on the emerging cyber insurance market that is currently in the process of standardizing and improving its risk analysis concerning the potential insured entity.
Design/methodology/approach
The authors' approach involves a quantitative analysis utilizing a Likert-style questionnaire designed to survey cyber insurance professionals. The authors' aim is to identify the current methods used in gathering information from potential clients, as well as the manner in which this information is analyzed by the insurers. Additionally, the authors gather insights on potential improvements that could be made to this process.
Findings
The study the authors elaborated it has a particularly important cyber and risk components for insurance area, because it addresses a “niche” area not yet proper addressed in specialized literature – cyber insurance. Cyber risk management approaches are not uniform at the international level, nor at the insurer level. Also, not all insurers can perform solid assessments, especially since their companies should first prove that they are fully compliant with international cyber security standards.
Research limitations/implications
This research has concentrated on analyzing the current practices in terms of gathering information about the insured entity before issuing the cyber insurance policy, level of details concerning the cyber security posture of the insured entity and way such information should be analyzed in a standardized and useful manner. The novelty of this research resides in the analysis performed as detailed above and the proposals in terms of information gathered, depth of analysis and standardization of approach made. Future work on the topic can focus on the standardization process for analyzing cyber risk for insurance clients, to improve the proposal based also on historical elements and trends in the market. Thus, future research can further refine the standardization process to analyze in more depth the way this can be implemented and included in relevant legislation at the EU level.
Practical implications
Proposed improvements include proposals in terms of the level of detail and the usefulness of an independent centralized approach for information gathering and analysis, especially given the re-insurance and brokerage activities. The authors also propose a common practical procedural approach in risk management, with the involvement of insurance companies and certification institutions of cyber security auditors.
Originality/value
The study investigates the information gathered by insurers from potential clients of cyber insurance and the way this is analyzed and updated for issuance of the insurance policy.
Details
Keywords
Nichapa Phraknoi, Mark Stevenson and Meng Jia
The purpose of this study is to define and investigate the governance requirements of supply chain finance (SCF).
Abstract
Purpose
The purpose of this study is to define and investigate the governance requirements of supply chain finance (SCF).
Design/methodology/approach
A qualitative analysis of 849 news articles published in UK newspapers (2000–2022) using the Gioia method.
Findings
SCF governance relies on developing capacities for reflexive scrutiny at two stages: (1) prior to entering into an SCF relationship and (2) during its operation. Based on the notion of SCF as a complex adaptive system, we theorise SCF governance requirements as a dual-layered semipermeable boundary. The semipermeability of the two layers allows for a dynamic exchange between the SCF system and its environment. The first layer is the capacity to selectively enable or control the entry and access of certain actors and practices into the SCF system. The second layer is a capacity for ongoing scrutiny of the SCF operation and its development. Further, we identify five aspects of governance to be enabled, i.e. enhancing adaptability, building confidence, improving efficiency, advancing technology and promoting transparency; and four aspects to be controlled, i.e. preventing abuse of power, curbing fraud risk, constraining operational risk and restricting risky extensions to SCF practices.
Practical implications
Our dynamic framework can guide supply chain (SC) members in making decisions about whether to participate, or continue to operate, in an SCF relationship. Moreover, the findings have implications for policymakers and authorities who oversee entry/access and the involvement of SCF providers, particularly, fintech firms.
Originality/value
The study contributes to both the SC and governance literature by providing a systematic analysis of what SCF governance has to accomplish. Our novel contribution lies in its analysis of SCF governance based on a complex adaptive system approach, which expands the existing literature where SCF is described in rather static terms. More specifically, it suggests a need for a dynamic duality of SCF governance through the semipermeable boundary that selectively enables and controls certain SCF actors and practices.
Details
Keywords
Peik-Foong Yeap and Melissa Li Sa Liow
This paper aims to determine the significance of tourist walkability on three community-based tourism sustainability indicators, namely, the economic, social and environmental…
Abstract
Purpose
This paper aims to determine the significance of tourist walkability on three community-based tourism sustainability indicators, namely, the economic, social and environmental benefits and costs impacting community’s quality of life through the lens of the triple bottom line approach with the institutional theory.
Design/methodology/approach
This study views institutions as either enabling or restricting the sustainable community-based tourism because institutions influence resource integration and value assessment by the beneficiary. Moreover, institutions also lead the co-creation of sustainable community-based tourism among various stakeholders. Drawing on this conceptualisation, the notion of sustainable community-based tourism is filtered through the lens of institutional theory. Thus, this work approaches sustainable community-based tourism as a dynamic process of co-creating a tourist destination formed by different actors’ and institutions within the ecosystem of the tourist destination. Meanwhile, the triple bottom line benefits and costs experienced by the overall community would produce net effects on the residents’ perceptions of sustainable tourism.
Findings
This paper classifies both tangible and intangible costs and benefits because of tourist walkability and its triple bottom line trade-offs experienced by tourists and residents. This paper penetrates new grounds by reviewing the triple bottom line impacts of tourist walkability on residents’ quality of life. Government policies as mediating variable and national culture and individual personalities of tourists and residents as moderating variables were discussed. A conceptual framework named Tourist Walkability Sustainable Tourism Impact on Residents (TWSTIR) is proposed. Finally, a Sustainable Community-based Tourism Strategic (SCBTS) model which is based on the two dimensions of intensity of tourist walkability and residents’ quality of life is proposed.
Research limitations/implications
Research limitations may include a lack of assessment on political, technological and legal issues, and therefore, future research is warranted in these three areas. Some emotions and attitudes of the residents may not be captured since the Gross National Index (Gross National Happiness) may have its inherent blind spots.
Practical implications
This paper would be of interest to the scholarly world, as its original idea and concluding research agenda are burrowing into a new sub-field of tourism research. In view of growth and degrowth of sustaining community-based tourism, the SCBTS model is presented to provide directions for tourism policymakers and entrepreneurs to formulate and implement appropriate strategy for the tourist walkability activity per se and investment in the accompanying infrastructure.
Social implications
This paper also presents the sacrifices and inequities in the communities and the relevance of government policies, national culture and individual personalities of tourists and residents, in which the attention of tourism policymakers and the communities that thrive on the travel and tourism industry should not be neglected.
Originality/value
The idea and discussion of this paper is original. This paper burrows into a new sub-field of tourism research. Tourist walkability needs more attention from the scholars, as this tourist activity can have positive and negative effects on residents’ quality of life. The TWSTIR framework is developed to discuss the relationships of tourist walkability, triple bottom line concept and residents’ quality of life within the sustainable community-based tourism scope. The SCBTS model is presented for tourism policymakers and entrepreneurs to perform appropriate strategy for the tourist walkability activity and investment in the accompanying infrastructure.
Details
Keywords
Nkeiru A. Emezie, Scholastica A.J. Chukwu, Ngozi M. Nwaohiri, Nancy Emerole and Ijeoma I. Bernard
University intellectual output such as theses and dissertations are valuable resources containing rigorous research results. Library staff who are key players in promoting…
Abstract
Purpose
University intellectual output such as theses and dissertations are valuable resources containing rigorous research results. Library staff who are key players in promoting intellectual output through institutional repositories require skills to promote content visibility, create wider outreach and facilitate easy access and use of these resources. This study aims to determine the skills of library staff to enhance the visibility of intellectual output in federal university libraries in southeast Nigeria.
Design/methodology/approach
A survey research design was adopted for the study. The questionnaire was used to obtain responses from library staff on the extent of computer skills and their abilities for digital conversion, metadata creation and preservation of digital content.
Findings
Library staff at the university libraries had high skills in basic computer operations. They had moderate skills in digital conversion, preservation and storage. However, they had low skills in metadata creation.
Practical implications
The study has implications for addressing the digital skills and professional expertise of library staff, especially as it concerns metadata creation, digital conversion, preservation and storage. It also has implications for the university management to prioritize the training of their library staff in other to increase the visibility of indigenous resources and university Web ranking.
Originality/value
This study serves as a lens to identify library staff skill gaps in many critical areas that require expertise and stimulate conscious effort toward developing adequate skills for effective digital information provision. It sheds light on the challenges that many Nigerian university libraries face in their pursuit of global visibility and university Web ranking.
Details
Keywords
Faisal Lone, Harsh Kumar Verma and Krishna Pal Sharma
The purpose of this study is to extensively explore the vehicular network paradigm, challenges faced by them and provide a reasonable solution for securing these vulnerable…
Abstract
Purpose
The purpose of this study is to extensively explore the vehicular network paradigm, challenges faced by them and provide a reasonable solution for securing these vulnerable networks. Vehicle-to-everything (V2X) communication has brought the long-anticipated goal of safe, convenient and sustainable transportation closer to reality. The connected vehicle (CV) paradigm is critical to the intelligent transportation systems vision. It imagines a society free of a troublesome transportation system burdened by gridlock, fatal accidents and a polluted environment. The authors cannot overstate the importance of CVs in solving long-standing mobility issues and making travel safer and more convenient. It is high time to explore vehicular networks in detail to suggest solutions to the challenges encountered by these highly dynamic networks.
Design/methodology/approach
This paper compiles research on various V2X topics, from a comprehensive overview of V2X networks to their unique characteristics and challenges. In doing so, the authors identify multiple issues encountered by V2X communication networks due to their open communication nature and high mobility, especially from a security perspective. Thus, this paper proposes a trust-based model to secure vehicular networks. The proposed approach uses the communicating nodes’ behavior to establish trustworthy relationships. The proposed model only allows trusted nodes to communicate among themselves while isolating malicious nodes to achieve secure communication.
Findings
Despite the benefits offered by V2X networks, they have associated challenges. As the number of CVs on the roads increase, so does the attack surface. Connected cars provide numerous safety-critical applications that, if compromised, can result in fatal consequences. While cryptographic mechanisms effectively prevent external attacks, various studies propose trust-based models to complement cryptographic solutions for dealing with internal attacks. While numerous trust-based models have been proposed, there is room for improvement in malicious node detection and complexity. Optimizing the number of nodes considered in trust calculation can reduce the complexity of state-of-the-art solutions. The theoretical analysis of the proposed model exhibits an improvement in trust calculation, better malicious node detection and fewer computations.
Originality/value
The proposed model is the first to add another dimension to trust calculation by incorporating opinions about recommender nodes. The added dimension improves the trust calculation resulting in better performance in thwarting attacks and enhancing security while also reducing the trust calculation complexity.
Details
Keywords
Hongkun Wang, Yongxiang Zhao, Yayun Qi and Yufeng Cao
The serious wear problem of heavy-haul freight vehicle wheels affects the safety and economy of vehicle operation. This paper aims to study wheel wear evolution law and the…
Abstract
Purpose
The serious wear problem of heavy-haul freight vehicle wheels affects the safety and economy of vehicle operation. This paper aims to study wheel wear evolution law and the influence of line parameters on wheel wear of heavy-haul freight, and provide the basis for operation and line maintenance.
Design/methodology/approach
The wheel wear test data of heavy-haul freight vehicles were analyzed. Then a heavy-haul freight vehicle dynamic model was established. The line parameters influencing wheel wear in heavy-haul freight vehicles were also analyzed by the Jendel wear model, and the effects of rail cant, rail gauge, rail profile and line ramp on wheel wear were analyzed.
Findings
A rail cant of 1:40 results in less wheel wear; an increase in the rail gauge can reduce wheel wear; and when matched with the CHN60 rail, the wear depth is relatively small. A decrease of 9.21% in wheel wear depth when matched with the CHN60 rail profile. The ramp of the heavy-haul line is necessary to consider for calculating wheel wear. When the ramp is considered, the wear depth increases by 8.47%. The larger the ramp, the greater the braking force and therefore, the greater of the wheel wear.
Originality/value
This paper first summarizes the wear characteristics of wheels in heavy-haul freight vehicles and then systematically analyzes the effect of line parameters on wheel wear. In particular, this study researched the effects of rail cant, rail gauge, rail profile and line ramp on wheel wear.
Peer review
The peer review history for this article is available at: https://publons.com/publon/10.1108/ILT-02-2024-0038/
Details
Keywords
Byung-Gak Son, Samuel Roscoe and ManMohan S. Sodhi
This study aims to answer the question: What dynamic capabilities do diverse humanitarian organizations have?
Abstract
Purpose
This study aims to answer the question: What dynamic capabilities do diverse humanitarian organizations have?
Design/methodology/approach
We examine this question through the lens of dynamic capabilities with sensing, seizing and reconfiguring capacities. The research team interviewed 15 individuals from 12 humanitarian organizations that had (a) different geographic scopes (global versus local) and (b) different missions (emergency response versus long-term development aid). We also gathered data from secondary sources, including standard operating procedures, company websites, and news databases (Factiva, Reuters and Bloomberg).
Findings
The findings identify the operational and dynamic capabilities of global and local humanitarian organizations while distinguishing between their mission to provide long-term development aid or emergency relief. (1) The global organizations, with their beneficiary responsiveness, reconfigured their sensing and seizing capacities throughout the COVID-19 pandemic by pivoting quickly to local procurement or regional supply chains. The long-term development organizations pivoted to multi-year supplier agreements with fixed pricing to counter price uncertainty and accessed social capital with government bodies. In contrast, emergency response organizations developed end-to-end supply chain visibility to sense changes in supply and demand. (2) Local humanitarian organizations developed the capacity to sense demand and supply changes to reconfigure based on their experiential learning working with the local community. The long-term-development local organizations used un-owned and scalable relief infrastructure to seize opportunities to rebuild affected areas. In contrast, emergency response organizations developed their capacity to seize opportunities to provide aid stemming from their decentralized decision-making, a lack of structured procedures, and the authority for increased expenditure.
Originality/value
We propose a theoretical framework to identify humanitarian organizations' operational and dynamic capabilities, distinguishing between global and local organizations and their emergency response and long-term aid missions.
Details