Search results

1 – 10 of 501
Article
Publication date: 16 May 2023

Naila Fares, Jaime Lloret, Vikas Kumar, Guilherme F. Frederico and Oulaid Kamach

The purpose of the study is to propose a framework for fleet management and make suitable distribution solution choices in the food industry.

Abstract

Purpose

The purpose of the study is to propose a framework for fleet management and make suitable distribution solution choices in the food industry.

Design/methodology/approach

This study reviews the literature to examine food distribution criteria. These criteria are used in the analytic hierarchy process (AHP) assessment and combined with discrete events simulation in a structured framework, which is validated through an empirical study.

Findings

The empirical case results demonstrate that both the AHP and discrete events simulation converge toward the same solution in most cases.

Originality/value

This study contributes to the literature on distribution management and develops a framework that can both guide future research and aid logistics practitioners in analysing distribution decision-making systems in dynamic environments.

Details

International Journal of Quality & Reliability Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0265-671X

Keywords

Article
Publication date: 5 June 2023

Nicholas Roberts and Inchan Kim

Although digital platforms have become important to organizations and society, little is known about how platforms evolve over time. This is particularly true for early-stage…

Abstract

Purpose

Although digital platforms have become important to organizations and society, little is known about how platforms evolve over time. This is particularly true for early-stage platforms provided by entrepreneurial firms competing in nascent markets. This study aims to investigate the relationship between a platform provider's mission and the evolution of its digital platform.

Design/methodology/approach

This study conducted an exploratory, multi-case study of startups in the emerging health/fitness wearables market over the period 2007 to 2016.

Findings

This study emerged two organizational mission constructs – consistency and specificity – and two evolutionary dynamics of digital platforms – unity and evolution rate. It also considered unity and evolution rate in terms of features created by the platform provider and features connected by external parties. This study found relationships between aspects of mission consistency and platform unity and identified relationships between aspects of mission specificity and platform evolution rates.

Originality/value

This study formalized findings into a set of theoretical propositions, thereby enriching the understanding of the relationship between organizational mission and digital platform evolution in nascent markets. This study provides new constructs and relationships that can be tested and refined in future research.

Details

Internet Research, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 15 March 2024

Nan Feng, Lei Zhang, Xin Liu and Jing Xie

With the development of digitalization and interconnection, there is a growing need for enterprise customers to ensure the compatibility of the third-party components they are…

Abstract

Purpose

With the development of digitalization and interconnection, there is a growing need for enterprise customers to ensure the compatibility of the third-party components they are using in the manufacturing process, thus raising the integration requirements for the Industrial Internet platform and its third-party developers. Therefore, our study investigates the optimal integration decision of the Industrial Internet platform while considering its access price, the integration cost, and the net utility derived by enterprise customers from the third-party components.

Design/methodology/approach

We model a two-sided Industrial Internet platform that connects customers on the demand side to the developers on the supply side. We then explore the integration decision of the Industrial Internet platform and its important factors by solving the optimal profit function.

Findings

First, despite the high integration cost of third-party developers, the platform still chooses to integrate when enterprise customers derive high utility from the third-party components. Second, due to the compatibility effect, charging the enterprise customers a higher price may reduce the platform profits when these customers derive low utility from the third-party components. Third, the platform profits will increase along with the integration cost of third-party developers when it is low in the case where enterprise customers derive low utility from third-party components.

Originality/value

Our findings offer insightful takeaways for the Industrial Internet platform when making integration decisions.

Details

Industrial Management & Data Systems, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0263-5577

Keywords

Article
Publication date: 7 November 2023

Martina Baglio, Claudia Colicchia, Alessandro Creazza and Fabrizio Dallari

An ever-increasing number of companies outsource logistics activities to third-party logistics (3PL) providers to beat the competition. From the buyer's (shippers') perspective…

Abstract

Purpose

An ever-increasing number of companies outsource logistics activities to third-party logistics (3PL) providers to beat the competition. From the buyer's (shippers') perspective, selecting the right 3PL provider is crucial, and from the 3PL provider's perspective, it is imperative to be attractive and to retain clients. To this aim, a potential lever can be physical assets, such as warehouses, which the literature has traditionally neglected. The objective is to benchmark the importance of warehouses for 3PL providers to attract/retain clients and for shippers to select the right 3PL provider.

Design/methodology/approach

The authors performed an empirical investigation through interviews on dyads (3PL providers/shippers) and utilized the Best-Worst Method (BWM) to rank the criteria used in the 3PL buying process and allow the warehouse's role to emerge.

Findings

Results show that the 3PL buying process consists of four phases and three evaluation steps. The selection criteria are classified into three groups: order qualifiers, order winners and retention factors. The warehouse has different levels of importance throughout the process. It appears that it can indirectly enhance the attractiveness and retention capability of 3PL providers through other selection criteria.

Originality/value

By combining the resource-based view and the customer value theory, this research extends the theory on logistics outsourcing by studying the phases of the 3PL buying process and scrutinizing the criteria used in different evaluation steps. The research adds a double perspective of analysis (3PL providers and shippers), which is missing in the literature, and focuses on the importance of warehouses.

Details

Benchmarking: An International Journal, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1463-5771

Keywords

Article
Publication date: 24 August 2023

Tanveer Kajla, Kirti Sood, Sanjay Gupta, Sahil Raj and Harpreet Singh

The objective of this research is to identify and prioritize the critical factors that influence the adoption of blockchain technology within the banking sector.

Abstract

Purpose

The objective of this research is to identify and prioritize the critical factors that influence the adoption of blockchain technology within the banking sector.

Design/methodology/approach

A well-known theoretical framework, the “Technology Organization Environment (TOE),” was chosen to analyze what criteria and sub-criteria affect blockchain adoption in the banking sector after a thorough assessment of the prior literature. Following that, 3 evaluation criteria and 14 sub-criteria were selected and verified using expert opinion. A survey design was created, and data for the study has been collected from various information technology (IT) managers/officers in the banking sector. A fuzzy analytic hierarchy process (Fuzzy-AHP) was then used to meet the purpose of the research.

Findings

The study identified that the organizational dimension is the most significant criteria for blockchain adoption in the banking sector, followed by the environmental dimension. In contrast, the technological dimension is the least influential criterion. Clientele pressure, IT resources, financial resources, pressure from competitors and relative advantage are the most influential sub-criteria for blockchain adoption.

Research limitations/implications

This study provides valuable insights to bank managers, blockchain and IT developers, third-party service providers and policymakers. For instance, adopting the same blockchain platform is easier for both large and small banks for banking operations by using third-party service provider. At the same time, banks should have the banks' own core team to implement the blockchain-based systems or to have control over the third-party service providers during the adoption stage.

Originality/value

To the best of the authors' knowledge, no empirical studies have used a holistic organizational context to understand the factors influencing the adoption of blockchain technology from traditional to blockchain-based banking systems.

Details

International Journal of Quality & Reliability Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0265-671X

Keywords

Article
Publication date: 9 April 2024

Derek L. Nazareth, Jae Choi and Thomas Ngo-Ye

This paper aims to examine the conditions under which small and medium enterprises (SMEs) invest in security services when they migrate their e-commerce applications to the cloud…

Abstract

Purpose

This paper aims to examine the conditions under which small and medium enterprises (SMEs) invest in security services when they migrate their e-commerce applications to the cloud environment. Using a risk management perspective, the paper assesses the impact of security service pricing, security incident prevalence and virulence to estimate SME security spending at the market level and draw out implications for SMEs and security service providers.

Design/methodology/approach

Security risks are inherently characterized by uncertainty. This study uses a Monte Carlo approach to understand the role of uncertainty in the decision to adopt security services. A model relating key security constructs is assembled based on key constructs from the domain. By manipulating security service costs and security incident types, the model estimates the market-level adoption of services, security incidents and damages incurred, along with measures of their relative dispersion.

Findings

Three key findings emerge from this study. First, adoption of services and protection is higher when tiered security services are provided, indicating that SMEs prefer to choose their security services rather than accept uniformly priced products. Second, SMEs are considered price-sensitive, resulting in a maximum level of spending in the market. Third, results indicate that security incidents and damages can be much higher than the mean in some cases, and this should serve as a cautionary note to SMEs.

Originality/value

Security spending has been modeled at the firm level. Adopting a market-level perspective represents a novel contribution. Additionally, the Monte Carlo approach provides managers with tangible measures of uncertainty, affording additional information and insight when making security service adoption decisions.

Details

Journal of Systems and Information Technology, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1328-7265

Keywords

Article
Publication date: 3 March 2023

Shing Cheong Hui, Ming Yung Kwok, Elaine W.S. Kong and Dickson K.W. Chiu

Although cloud storage services can bring users valuable convenience, they can be technically complex and intrinsically insecure. Therefore, this research explores the concerns of…

Abstract

Purpose

Although cloud storage services can bring users valuable convenience, they can be technically complex and intrinsically insecure. Therefore, this research explores the concerns of academic users regarding cloud security and technical issues and how such problems may influence their continuous use in daily life.

Design/methodology/approach

This qualitative study used a semi-structured interview approach comprising six main open-ended questions to explore the information security and technical issues for the continuous use of cloud storage services by 20 undergraduate students in Hong Kong.

Findings

The analysis revealed cloud storage service users' major security and technical concerns, particularly synchronization and backup issues, were the most significant technical barrier to the continuing personal use of cloud storage services.

Originality/value

Existing literature has focused on how cloud computing services could bring benefits and security and privacy-related risks to organizations rather than security and technical issues of personal use, especially in the Asian academic context.

Details

Library Hi Tech, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0737-8831

Keywords

Article
Publication date: 5 April 2024

Valeria Belvedere, Herbert Kotzab and Elisa Martina Martinelli

This paper aims to explore the conditions in a business-to-business-to-consumer (B2B2C) context characterized by new technologies. Innovations enhance disintermediation and pursue…

Abstract

Purpose

This paper aims to explore the conditions in a business-to-business-to-consumer (B2B2C) context characterized by new technologies. Innovations enhance disintermediation and pursue sustainability goals that drive customers’ willingness to use eco-friendly delivery options, namely, parcel lockers – in e-commerce and their impacts in terms of communication and transparency along the supply network.

Design/methodology/approach

The study conducted an extensive survey in Italy and Germany, collecting 1,010 usable responses. Structural equation modelling was used to analyse the data with the aim of identifying the factors that drive customers’ willingness to use parcel lockers and the effect on customers’ behaviour as determined by the disclosure of information about the environmental performance of different delivery options.

Findings

The results highlight several factors affecting the willingness to use parcel lockers, namely, performance and effort expectancy, social influence, technology anxiety, hedonistic motivation and environmental knowledge. The results also demonstrate that the disclosure of information about the environmental performance of different delivery options influences customers’ behaviour.

Research limitations/implications

This paper faces several limitations, mostly related to the focus on just two countries, the use of cross-sectional data and the survey’s explicit reference to just one type of product. Nevertheless, the findings contribute to the discussion on the relevance of information sharing along the supply chain, providing favourable evidence in this regard. It also improves the stream of research concerning technology adoption in the context of e-commerce, highlighting factors that can lead consumers to use eco-friendly self-service technologies.

Practical implications

The results can support companies in understanding how they can design and manage the last mile of delivery to jointly achieve customer satisfaction, process efficiency and superior environmental performance.

Originality/value

This pioneering contribution studies the adoption of delivery solutions for e-commerce and its implications for the supply network.

Details

Journal of Business & Industrial Marketing, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0885-8624

Keywords

Article
Publication date: 22 June 2022

Shubangini Patil and Rekha Patil

Until now, a lot of research has been done and applied to provide security and original data from one user to another, such as third-party auditing and several schemes for…

Abstract

Purpose

Until now, a lot of research has been done and applied to provide security and original data from one user to another, such as third-party auditing and several schemes for securing the data, such as the generation of the key with the help of encryption algorithms like Rivest–Shamir–Adleman and others. Here are some of the related works that have been done previously. Remote damage control resuscitation (RDCR) scheme by Yan et al. (2017) is proposed based on the minimum bandwidth. By enabling the third party to perform the verification of public integrity. Although it supports the repair management for the corrupt data and tries to recover the original data, in practicality it fails to do so, and thus it takes more computation and communication cost than our proposed system. In a paper by Chen et al. (2015), using broadcast encryption, an idea for cloud storage data sharing has been developed. This technique aims to accomplish both broadcast data and dynamic sharing, allowing users to join and leave a group without affecting the electronic press kit (EPK). In this case, the theoretical notion was true and new, but the system’s practicality and efficiency were not acceptable, and the system’s security was also jeopardised because it proposed adding a member without altering any keys. In this research, an identity-based encryption strategy for data sharing was investigated, as well as key management and metadata techniques to improve model security (Jiang and Guo, 2017). The forward and reverse ciphertext security is supplied here. However, it is more difficult to put into practice, and one of its limitations is that it can only be used for very large amounts of cloud storage. Here, it extends support for dynamic data modification by batch auditing. The important feature of the secure and efficient privacy preserving provable data possession in cloud storage scheme was to support every important feature which includes data dynamics, privacy preservation, batch auditing and blockers verification for an untrusted and an outsourced storage model (Pathare and Chouragadec, 2017). A homomorphic signature mechanism was devised to prevent the usage of the public key certificate, which was based on the new id. This signature system was shown to be resistant to the id attack on the random oracle model and the assault of forged message (Nayak and Tripathy, 2018; Lin et al., 2017). When storing data in a public cloud, one issue is that the data owner must give an enormous number of keys to the users in order for them to access the files. At this place, the knowledge assisted software engineering (KASE) plan was publicly unveiled for the first time. While sharing a huge number of documents, the data owner simply has to supply the specific key to the user, and the user only needs to provide the single trapdoor. Although the concept is innovative, the KASE technique does not apply to the increasingly common manufactured cloud. Cui et al. (2016) claim that as the amount of data grows, distribution management system (DMS) will be unable to handle it. As a result, various proven data possession (PDP) schemes have been developed, and practically all data lacks security. So, here in these certificates, PDP was introduced, which was based on bilinear pairing. Because of its feature of being robust as well as efficient, this is mostly applicable in DMS. The main purpose of this research is to design and implement a secure cloud infrastructure for sharing group data. This research provides an efficient and secure protocol for multiple user data in the cloud, allowing many users to easily share data.

Design/methodology/approach

The methodology and contribution of this paper is given as follows. The major goal of this study is to design and implement a secure cloud infrastructure for sharing group data. This study provides an efficient and secure protocol for multiple user data in cloud, allowing several users to share data without difficulty. The primary purpose of this research is to design and implement a secure cloud infrastructure for sharing group data. This research develops an efficient and secure protocol for multiple user data in the cloud, allowing numerous users to exchange data without difficulty. Selection scheme design (SSD) comprises two algorithms; first algorithm is designed for limited users and algorithm 2 is redesigned for the multiple users. Further, the authors design SSD-security protocol which comprises a three-phase model, namely, Phase 1, Phase 2 and Phase 3. Phase 1 generates the parameters and distributes the private key, the second phase generates the general key for all the users that are available and third phase is designed to prevent the dishonest user to entertain in data sharing.

Findings

Data sharing in cloud computing provides unlimited computational resources and storage to enterprise and individuals; moreover, cloud computing leads to several privacy and security concerns such as fault tolerance, reliability, confidentiality and data integrity. Furthermore, the key consensus mechanism is fundamental cryptographic primitive for secure communication; moreover, motivated by this phenomenon, the authors developed SSDmechanismwhich embraces the multiple users in the data-sharing model.

Originality/value

Files shared in the cloud should be encrypted for security purpose; later these files are decrypted for the users to access the file. Furthermore, the key consensus process is a crucial cryptographic primitive for secure communication; additionally, the authors devised the SSD mechanism, which incorporates numerous users in the data-sharing model, as a result of this phenomena. For evaluation of the SSD method, the authors have considered the ideal environment of the system, that is, the authors have used java as a programming language and eclipse as the integrated drive electronics tool for the proposed model evaluation. Hardware configuration of the model is such that it is packed with 4 GB RAM and i7 processor, the authors have used the PBC library for the pairing operations (PBC Library, 2022). Furthermore, in the following section of this paper, the number of users is varied to compare with the existing methodology RDIC (Li et al., 2020). For the purposes of the SSD-security protocol, a prime number is chosen as the number of users in this work.

Details

International Journal of Pervasive Computing and Communications, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 4 December 2023

Ben Krishna, Satish Krishnan and M.P. Sebastian

The current body of empirical research regarding the impact of trust in the cybersecurity commitment of institutions on digital payment usage has focused solely on a macro-level…

Abstract

Purpose

The current body of empirical research regarding the impact of trust in the cybersecurity commitment of institutions on digital payment usage has focused solely on a macro-level analysis, overlooking the intricate dynamics between institutions' cybersecurity commitments and the trust levels of digital payment users. In light of this limitation, this study aims to offer a more comprehensive understanding of this complex relationship.

Design/methodology/approach

A case study was conducted on digital payment users in India through the critical realist lens. To gather data, interviews and focus group discussions were conducted with digital payment users from various regions of the country.

Findings

The citizen-centric outcomes of the national cybersecurity commitment (performance and responsiveness) are the most prominent and impactful trust indicators. These outcomes play a crucial role in shaping digital payment users' perception and trust in the cybersecurity commitment of public institutions. Individuals' value positions also influence trust judgments, as it is essential to recognize the value tensions that may arise due to security implementation and their congruence with citizens' values.

Research limitations/implications

The findings of this study have significant implications for policymakers. They are potentially an artifact of the security and perception of digital payment users and the cultural uniqueness of digital payment users in India.

Originality/value

The study proposes a holistic understanding of the relationship between institutions' cybersecurity commitments and the trust levels of digital payment users. It offers a qualitative evaluation of how digital payment users perceive and construe efficient information security management implemented by public institutions.

Details

Information Technology & People, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0959-3845

Keywords

1 – 10 of 501