Search results

1 – 10 of over 9000
Open Access
Article
Publication date: 19 June 2017

Tracy Harwood and Tony Garry

The characteristics of the Internet of Things (IoT) are such that traditional models of trust developed within interpersonal, organizational, virtual and information systems

7354

Abstract

Purpose

The characteristics of the Internet of Things (IoT) are such that traditional models of trust developed within interpersonal, organizational, virtual and information systems contexts may be inappropriate for use within an IoT context. The purpose of this paper is to offer empirically generated understandings of trust within potential IoT applications.

Design/methodology/approach

In an attempt to capture and communicate the complex and all-pervading but frequently inconspicuous nature of ubiquitous technologies within potential IoT techno-systems, propositions developed are investigated using a novel mixed methods research design combining a videographic projective technique with a quantitative survey, sampling 1,200 respondents.

Findings

Research findings suggest the dimensionality of trust may vary according to the IoT techno-service context being assessed.

Originality/value

The contribution of this paper is twofold. First, and from a theoretical perspective, it offers a conceptual foundation for trust dimensions within potential IoT applications based upon empirical evaluation. Second, and from a pragmatic perspective, the paper offers insights into how findings may guide practitioners in developing appropriate trust management systems dependent upon the characteristics of particular techno-service contexts.

Details

Journal of Service Management, vol. 28 no. 3
Type: Research Article
ISSN: 1757-5818

Keywords

Open Access
Article
Publication date: 21 February 2024

Tina Bedenik, Claudine Kearney and Éidín Ní Shé

In this viewpoint article, the authors recognize the increased focus in health systems on co-design for innovation and change. This article explores the role of leaders and…

Abstract

Purpose

In this viewpoint article, the authors recognize the increased focus in health systems on co-design for innovation and change. This article explores the role of leaders and mangers in developing and enhancing a culture of trust in their organizations to enable co-design, with the potential to drive innovation and change in healthcare.

Design/methodology/approach

Using social science analyses, the authors argue that current co-design literature has limited focus on interactions between senior leaders and managers, and healthcare staff and service users in supporting co-designed innovation and change. The authors draw on social and health science studies of trust to highlight how the value-based co-design process needs to be supported and enhanced. We outline what co-design innovation and change involve in a health system, conceptualize trust and reflect on its importance within the health system, and finally note the role of senior leaders and managers in supporting trust and responsiveness for co-designed innovation and change.

Findings

Healthcare needs leaders and managers to embrace co-design that drives innovation now and in the future through people – leading to better healthcare for society at large. As authors we argue that it is now the time to shift our focus on the role of senior managers and leaders to embed co-design into health and social care structures, through creating and nurturing a culture of trust.

Originality/value

Building public trust in the health system and interpersonal trust within the health system is an ongoing process that relies upon personal behavior of managers and senior leaders, organizational practices within the system, as well as political processes that underpin these practices. By implementing managerial, leadership and individual practices on all levels, senior managers and leaders provide a mechanism to increase both trust and responsiveness for co-design that supports innovation and change in the health system.

Details

Journal of Health Organization and Management, vol. 38 no. 9
Type: Research Article
ISSN: 1477-7266

Keywords

Open Access
Article
Publication date: 25 October 2022

Heitor Hoffman Nakashima, Daielly Mantovani and Celso Machado Junior

This paper aims to investigate whether professional data analysts’ trust of black-box systems is increased by explainability artifacts.

1013

Abstract

Purpose

This paper aims to investigate whether professional data analysts’ trust of black-box systems is increased by explainability artifacts.

Design/methodology/approach

The study was developed in two phases. First a black-box prediction model was estimated using artificial neural networks, and local explainability artifacts were estimated using local interpretable model-agnostic explanations (LIME) algorithms. In the second phase, the model and explainability outcomes were presented to a sample of data analysts from the financial market and their trust of the models was measured. Finally, interviews were conducted in order to understand their perceptions regarding black-box models.

Findings

The data suggest that users’ trust of black-box systems is high and explainability artifacts do not influence this behavior. The interviews reveal that the nature and complexity of the problem a black-box model addresses influences the users’ perceptions, trust being reduced in situations that represent a threat (e.g. autonomous cars). Concerns about the models’ ethics were also mentioned by the interviewees.

Research limitations/implications

The study considered a small sample of professional analysts from the financial market, which traditionally employs data analysis techniques for credit and risk analysis. Research with personnel in other sectors might reveal different perceptions.

Originality/value

Other studies regarding trust in black-box models and explainability artifacts have focused on ordinary users, with little or no knowledge of data analysis. The present research focuses on expert users, which provides a different perspective and shows that, for them, trust is related to the quality of data and the nature of the problem being solved, as well as the practical consequences. Explanation of the algorithm mechanics itself is not significantly relevant.

Details

Revista de Gestão, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1809-2276

Keywords

Open Access
Article
Publication date: 5 August 2019

Ahmed H. Al-Dmour, Masam Abood and Hani H. Al-Dmour

This study aims at investigating the extent of SysTrust’s framework (principles and criteria) as an internal control approach for assuring the reliability of accounting…

6370

Abstract

Purpose

This study aims at investigating the extent of SysTrust’s framework (principles and criteria) as an internal control approach for assuring the reliability of accounting information system (AIS) were being implemented in Jordanian business organizations.

Design/methodology/approach

The study is based on primary data collected through a structured questionnaire from 239 out of 328 shareholdings companies. The survey units were the shareholding companies in Jordan, and the single key respondents approach was adopted. The extents of SysTrust principles were also measured. Previously validated instruments were used where required. The data were analysed using t-test and ANOVA.

Findings

The results indicated that the extent of SysTrust being implemented could be considered to be moderate at this stage. This implies that there are some variations among business organizations in terms of their level of implementing of SysTrust principles and criteria. The results also showed that the extent of SysTrust principles being implemented was varied among business organizations based on their business sector. However, there were not found varied due to their size of business and a length of time in business (experience).

Research limitations/implications

This study is only conducted in Jordan as a developing country. Although Jordan is a valid indicator of prevalent factors in the wider MENA region and developing countries, the lack of external validity of this research means that any generalization of the research findings should be made with caution. Future research can be orientated to other national and cultural settings and compared with the results of this study.

Practical implications

The study provides evidence of the need for management to recognize the importance of the implementation of SysTrust principles and criteria as an internal control for assuring the reliability of AIS within their organizations and be aware which of these principles are appropriate to their size and industry sector.

Originality/value

The findings would be valuable for academic researchers, managers and professional accounting to acquire a better undemanding of the current status of the implementation of the SysTrust principles (i.e., availability, security, integrity processing, confidentiality, and privacy) as an internal control method for assuring the reliability of AIS by testing the phenomenon in Jordan as a developing country.

Details

International Journal of Accounting & Information Management, vol. 27 no. 3
Type: Research Article
ISSN: 1834-7649

Keywords

Open Access
Article
Publication date: 11 July 2016

Jorge Tiago Martins and Miguel Baptista Nunes

This paper aims to examine how academics enact trust in e-learning through an inductive identification of perceived risks and enablers involved in e-learning adoption, in the…

7444

Abstract

Purpose

This paper aims to examine how academics enact trust in e-learning through an inductive identification of perceived risks and enablers involved in e-learning adoption, in the context of higher education institutions (HEIs).

Design/methodology/approach

Grounded Theory was the methodology used to systematically analyse data collected in semi-structured interviews with 62 academics. Data analysis followed the constant comparative method and its three-staged coding approach: open, axial and selective coding.

Findings

The resulting trajectory of trust factors is presented in a Grounded Theory narrative where individual change and integration through shared collective understanding and institutionalisation are discussed as stages leading to the overcoming of e-learning adoption barriers.

Originality/value

The paper proposes that the interplay between institutionalism and individualism has implications in the success or failure of strategies for the adoption of e-learning in HEIs, as perceived by academics. In practical terms, this points to the need for close attention to contextually sensitive trust-building mechanisms that promote the balance between academics’ commitments, values and sense of self-worth and centrally planned policy, rules, resources and exhortations that enable action.

Details

The Learning Organization, vol. 23 no. 5
Type: Research Article
ISSN: 0969-6474

Keywords

Open Access
Article
Publication date: 16 November 2015

Steven Cranfield, Jane Hendy, Barnaby Reeves, Andrew Hutchings, Simon Collin and Naomi Fulop

The purpose of this paper is to better understand how and why adoption and implementation of healthcare IT innovations occur. The authors examine two IT applications, computerised…

5682

Abstract

Purpose

The purpose of this paper is to better understand how and why adoption and implementation of healthcare IT innovations occur. The authors examine two IT applications, computerised physician order entry (CPOE) and picture archiving and communication systems (PACS) at the meso and micro levels, within the context of the National Programme for IT in the English National Health Service (NHS).

Design/methodology/approach

To analyse these multi-level dynamics, the authors blend Rogers’ diffusion of innovations theory (DoIT) with Webster’s sociological critique of technological innovation in medicine and healthcare systems to illuminate a wider range of interacting factors. Qualitative data collected between 2004 and 2006 uses semi-structured, in-depth interviews with 72 stakeholders across four English NHS hospital trusts.

Findings

Overall, PACS was more successfully implemented (fully or partially in three out of four trusts) than CPOE (implemented in one trust only). Factors such as perceived benefit to users and attributes of the application – in particular speed, ease of use, reliability and flexibility and levels of readiness – were highly relevant but their influence was modulated through interaction with complex structural and relational issues.

Practical implications

Results reveal that combining contextual system level theories with DoIT increases understanding of real-life processes underpinning implementation of IT innovations within healthcare. They also highlight important drivers affecting success of implementation, including socio-political factors, the social body of practice and degree of “co-construction” between designers and end-users.

Originality/value

The originality of the study partly rests on its methodological innovativeness and its value on critical insights afforded into understanding complex IT implementation programmes.

Details

Journal of Health Organization and Management, vol. 29 no. 7
Type: Research Article
ISSN: 1477-7266

Keywords

Open Access
Article
Publication date: 16 January 2024

Ville Jylhä, Noora Hirvonen and Jutta Haider

This study addresses how algorithmic recommendations and their affordances shape everyday information practices among young people.

Abstract

Purpose

This study addresses how algorithmic recommendations and their affordances shape everyday information practices among young people.

Design/methodology/approach

Thematic interviews were conducted with 20 Finnish young people aged 15–16 years. The material was analysed using qualitative content analysis, with a focus on everyday information practices involving online platforms.

Findings

The key finding of the study is that the current affordances of algorithmic recommendations enable users to engage in more passive practices instead of active search and evaluation practices. Two major themes emerged from the analysis: enabling not searching, inviting high trust, which highlights the how the affordances of algorithmic recommendations enable the delegation of search to a recommender system and, at the same time, invite trust in the system, and constraining finding, discouraging diversity, which focuses on the constraining degree of affordances and breakdowns associated with algorithmic recommendations.

Originality/value

This study contributes new knowledge regarding the ways in which algorithmic recommendations shape the information practices in young people's everyday lives specifically addressing the constraining nature of affordances.

Details

Journal of Documentation, vol. 80 no. 7
Type: Research Article
ISSN: 0022-0418

Keywords

Content available
Article
Publication date: 23 June 2021

Joe Garcia, Russell Shannon, Aaron Jacobson, William Mosca, Michael Burger and Roberto Maldonado

This paper aims to describe an effort to provide for a robust and secure software development paradigm intended to support DevSecOps in a naval aviation enterprise (NAE) software…

1335

Abstract

Purpose

This paper aims to describe an effort to provide for a robust and secure software development paradigm intended to support DevSecOps in a naval aviation enterprise (NAE) software support activity (SSA), with said paradigm supporting strong traceability and provability concerning the SSA’s output product, known as an operational flight program (OFP). Through a secure development environment (SDE), each critical software development function performed on said OFP during its development has a corresponding record represented on a blockchain.

Design/methodology/approach

An SDE is implemented as a virtual machine or container incorporating software development tools that are modified to support blockchain transactions. Each critical software development function, e.g. editing, compiling, linking, generates a blockchain transaction message with associated information embedded in the output of a said function that, together, can be used to prove integrity and support traceability. An attestation process is used to provide proof that the toolchain containing SDE is not subject to unauthorized modification at the time said critical function is performed.

Findings

Blockchain methods are shown to be a viable approach for supporting exhaustive traceability and strong provability of development system integrity for mission-critical software produced by an NAE SSA for NAE embedded systems software.

Practical implications

A blockchain-based authentication approach that could be implemented at the OFP point-of-load would provide for fine-grain authentication of all OFP software components, with each component or module having its own proof-of-integrity (including the integrity of the used development tools) over its entire development history.

Originality/value

Many SSAs have established control procedures for development such as check-out/check-in. This does not prove the SSA output software is secure. For one thing, a build system does not necessarily enforce procedures in a way that is determinable from the output. Furthermore, the SSA toolchain itself could be attacked. The approach described in this paper enforces security policy and embeds information into the output of every development function that can be cross-referenced to blockchain transaction records for provability and traceability that only trusted tools, free from unauthorized modifications, are used in software development. A key original concept of this approach is that it treats assigned developer time as a transferable digital currency.

Open Access

Abstract

Details

Obsessive Measurement Disorder or Pragmatic Bureaucracy?
Type: Book
ISBN: 978-1-80117-377-3

Open Access
Article
Publication date: 10 March 2022

Mike Brookbanks and Glenn Parry

This paper examines the impact of a blockchain platform on the role and importance of trust in established buyer-supplier relationships.

8708

Abstract

Purpose

This paper examines the impact of a blockchain platform on the role and importance of trust in established buyer-supplier relationships.

Design/methodology/approach

A literature review provides insight into trust development in supply chains. Research uses a case study of two wine supply chains: the producers, importers, logistics companies and UK Government agencies. Semi-structured interviews determine how trust and trustworthiness develop in buyer-supplier relationships and the impact of a blockchain-based technology proof of concept on supply chain trust.

Findings

A blockchain-based platform introduces common trusted data, reducing data duplication and improving supply chain visibility. The platform supports trust building between parties but does not replace the requirements for organisations to establish a position of trust. Contrary to literature claims for blockchain trustless disintermediation, new intermediaries are introduced who need to be trusted.

Research limitations/implications

The case study presents challenges specific to UK customs borders, and research needs to be repeated in different contexts to establish if findings are generalisable.

Practical implications

A blockchain-based platform can improve supply chain efficiency and trust development but does not remove the need for trust and trust-building processes. Blockchain platform providers need to build a position of trust with all participants.

Originality/value

Case study research shows how blockchain facilitates but does not remove trust, trustworthiness and trust relationships in established supply chains. The reduction in information asymmetry and improved supply chain visibility provided by blockchain does not change the importance of trust in established buyer-supplier relationships or the trust-based policy of the UK Government at the customs border.

Details

Supply Chain Management: An International Journal, vol. 27 no. 7
Type: Research Article
ISSN: 1359-8546

Keywords

1 – 10 of over 9000