Search results

1 – 10 of over 1000
Article
Publication date: 10 January 2024

Burcu Üzüm, Osman Seray Özkan and Irene Huertas-Valdivia

A quantitative study sought to better understand responsible leadership (RL) style in the private security sector. The authors analyzed RL’s mediating role in the relationship…

Abstract

Purpose

A quantitative study sought to better understand responsible leadership (RL) style in the private security sector. The authors analyzed RL’s mediating role in the relationship between rules climate (RC) and employees' perceived organizational support (POS).

Design/methodology/approach

The data were collected through an online questionnaire administered to full-time private guards in Ankara (Turkey). A mediation model was proposed, and research hypotheses were tested with structural equation modeling (SEM).

Findings

The results indicate a significant positive relationship between the company’s RC and managers' RL, and a positive significant relationship between managers' RL and employees' POS. RL mediates the relationship between company’s RC and employees' POS.

Research limitations/implications

The theoretical framework draws on conservation of resources (COR) theory to consider RL an effective resource. The organization’s RC was a key factor the affecting leader’s responsible behaviors.

Originality/value

This study explores a thriving leadership style, gaining research attention across fields. To the authors' knowledge, no prior research has studied this leadership style in the security sector. The authors use COR to increase understanding of an important antecedent (company’s RC) and consequence (employees' POS) of RL, highlighting this emerging style’s mediating role.

Propósito

Este artículo de enfoque cuantitativo favorece una mayor comprensión del liderazgo responsable (RL) en el sector de la seguridad privada. Analiza el papel mediador de este estilo de liderazgo en la relación entre un clima de regulación (RC) y la percepción de los trabajadores del apoyo organizacional (POS).

Diseño/metodología/enfoque

Los datos fueron recolectados a través de un cuestionario online que se administró a guardas de seguridad privados empleados a tiempo completo en la región de Ankara (Turquía). Se propone un modelo de mediación y se comprueban las hipótesis propuestas a través de ecuaciones estructurales con el software (SEM).

Resultados

Los resultados obtenidos indican una relación positiva y significativa entre el RC y el liderazgo responsable de los superiores, así como una relación también positiva y significativa entre el RL y la POS de los empleados. Se encuentra que el RL media la relación entre el RC y el POS.

Implicaciones de la investigación

Bajo el marco teórico de la Teoría de Conservación de Recursos (COR) se considera que el RL es un recurso altamente efectivo para las organizaciones. El RC de la organización se perfila como un factor clave que afecta los comportamientos del líder responsable.

Limitaciones del trabajo

El diseño transversal del estudio (datos recogidos en un memento del tiempo) y el uso de una muestra de conveniencia son las principales limitaciones del trabajo.

Originalidad/valor

Este estudio explora un estilo de liderazgo aún desconocido, pero con gran potencial, que está ganando fuerza en el ámbito de la investigación científica en los últimos años. Según nuestro conocimiento, se trata del primer estudio que explora este novedoso estilo de liderazgo en el sector de la seguridad privada. El empleo de la Teoría COR favorece la comprensión del RC como un antecedente de este estilo de liderazgo (RL), y también contribuye a comprender la POS de los empleados como clara consecuencia, destacando el papel mediador de este estilo de liderazgo emergente.

Open Access
Article
Publication date: 8 May 2024

Tapas Kumar Sethy and Naliniprava Tripathy

This study aims to explore the impact of systematic liquidity risk on the averaged cross-sectional equity return of the Indian equity market. It also examines the effects of…

Abstract

Purpose

This study aims to explore the impact of systematic liquidity risk on the averaged cross-sectional equity return of the Indian equity market. It also examines the effects of illiquidity and decomposed illiquidity on the conditional volatility of the equity market.

Design/methodology/approach

The present study employs the Liquidity Adjusted Capital Asset Pricing Model (LCAPM) for pricing systematic liquidity risk using the Fama & MacBeth cross-sectional regression model in the Indian stock market from January 1, 2012, to March 31, 2021. Further, the study employed an exponential generalized autoregressive conditional heteroscedastic (1,1) model to observe the impact of decomposed illiquidity on the equity market’s conditional volatility. The study also uses the Ordinary Least Square (OLS) model to illuminate the return-volatility-liquidity relationship.

Findings

The study’s findings indicate that the commonality between individual security liquidity and aggregate liquidity is positive, and the covariance of individual security liquidity and the market return negatively affects the expected return. The study’s outcome specifies that illiquidity time series analysis exhibits the asymmetric effect of directional change in return on illiquidity. Further, the study indicates a significant impact of illiquidity and decomposed illiquidity on conditional volatility. This suggests an asymmetric effect of illiquidity shocks on conditional volatility in the Indian stock market.

Originality/value

This study is one of the few studies that used the World Uncertainty Index (WUI) to measure liquidity and market risks as specified in the LCAPM. Further, the findings of the reverse impact of illiquidity and decomposed higher and lower illiquidity on conditional volatility confirm the presence of price informativeness and its immediate effects on illiquidity in the Indian stock market. The study strengthens earlier studies and offers new insights into stock market liquidity to clarify the association between liquidity and stock return for effective policy and strategy formulation that can benefit investors.

Details

China Accounting and Finance Review, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1029-807X

Keywords

Article
Publication date: 12 March 2024

Elena Isabel Vazquez Melendez, Paul Bergey and Brett Smith

This study aims to examine the blockchain landscape in supply chain management by drawing insights from academic and industry literature. It identifies the key drivers…

524

Abstract

Purpose

This study aims to examine the blockchain landscape in supply chain management by drawing insights from academic and industry literature. It identifies the key drivers, categorizes the products involved and highlights the business values achieved by early adopters of blockchain technology within the supply chain domain. Additionally, it explores fingerprinting techniques to establish a robust connection between physical products and the blockchain ledger.

Design/methodology/approach

The authors combined the interpretive sensemaking systematic literature review to offer insights into how organizations interpreted their business challenges and adopted blockchain technology in their specific supply chain context; content analysis (using Leximancer automated text mining software) for concept mapping visualization, facilitating the identification of key themes, trends and relationships, and qualitative thematic analysis (NVivo) for data organization, coding and enhancing the depth and efficiency of analysis.

Findings

The findings highlight the transformative potential of blockchain technology and offer valuable insights into its implementation in optimizing supply chain operations. Furthermore, it emphasizes the importance of product provenance information to consumers, with blockchain technology offering certainty and increasing customer loyalty toward brands that prioritize transparency.

Research limitations/implications

This research has several limitations that should be acknowledged. First, there is a possibility that some relevant investigations may have been missed or omitted, which could impact the findings. In addition, the limited availability of literature on blockchain adoption in supply chains may restrict the scope of the conclusions. The evolving nature of blockchain adoption in supply chains also poses a limitation. As the technology is in its infancy, the authors expect that a rapidly emerging body of literature will provide more extensive evidence-based general conclusions in the future. Another limitation is the lack of information contrasting academic and industry research, which could have provided more balanced insights into the technology’s advancement. The authors attributed this limitation to the narrow collaborations between academia and industry in the field of blockchain for supply chain management.

Practical implications

Practitioners recognize the potential of blockchain in addressing industry-specific challenges, such as ensuring transparency and data provenance. Understanding the benefits achieved by early adopters can serve as a starting point for companies considering blockchain adoption. Blockchain technology can verify product origin, enable truthful certifications and comply with established standards, reinforcing trust among stakeholders and customers. Thus, implementing blockchain solutions can enhance brand reputation and consumer confidence by ensuring product authenticity and quality. Based on the results, companies can align their strategies and initiatives with their needs and expectations.

Social implications

In essence, the integration of blockchain technology within supply chain provenance initiatives not only influences economic aspects but also brings substantial social impacts by reinforcing consumer trust, encouraging sustainable and ethical practices, combating product counterfeiting, empowering stakeholders and contributing to a more responsible, transparent and progressive socioeconomic environment.

Originality/value

This study consolidates current knowledge on blockchain’s capacity and identifies the specific drivers and business values associated with early blockchain adoption in supply chain provenance. Furthermore, it underscores the critical role of product fingerprinting techniques in supporting blockchain for supply chain provenance, facilitating more robust and efficient supply chain operations.

Details

Supply Chain Management: An International Journal, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1359-8546

Keywords

Article
Publication date: 21 May 2024

Zhe Dai, Yazhen Gong, Shashi Kant and Guodong Ma

This article aims to explore the impact of climate disasters on small-scale farmers’ willingness to cooperate and explore the mediating effect of social capital.

Abstract

Purpose

This article aims to explore the impact of climate disasters on small-scale farmers’ willingness to cooperate and explore the mediating effect of social capital.

Design/methodology/approach

The study investigates farmers’ willingness to cooperate through a framed field approach and surveys the information of individuals and villages, including climate disasters and social capital, using a structured questionnaire from rural communities in Jiangxi and Sichuan, China.

Findings

The results show that climate disasters and social capital are significant and positive determinants of farmers’ willingness to cooperate. In specific types of climate disasters, drought is positively associated with farmers’ cooperation willingness. Moreover, the mediation effect of drought on farmers’ willingness to cooperate through social capital has been demonstrated to be significant although negative, whereas the mediation effect of flood on farmers’ willingness to cooperate through social capital is significant and positive.

Originality/value

First, given the limited studies focusing on the impact of climate disasters on small-scale farmers’ willingness to cooperate, the authors complement the existing literature through a framed field experiment approach by designing a scenario that every farmer may encounter in their production activities. Second, the study figures out the roles of drought and flood as different kinds of climate disasters in farmers’ decision-making of cooperation and sheds light on the positive impact of climate disasters on small-scale farmers. Finally, this paper provides empirical evidence of social capital as a potential channel through which climate disasters could possibly affect farmers’ willingness to cooperate.

Details

China Agricultural Economic Review, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1756-137X

Keywords

Article
Publication date: 7 May 2024

Richard Kapend, Mark Button and Peter Stiernstedt

A significant number of criminal and deviant acts are investigated by nonpolice actors. These include private investigators who charge fees for their services, professional…

Abstract

Purpose

A significant number of criminal and deviant acts are investigated by nonpolice actors. These include private investigators who charge fees for their services, professional services firms such as firms of accountants who also charge fees, in-house investigators employed by private organisations and in-house investigators of public sector organisations who are not sworn police officers. Some of these investigators, such as private investigators, have been exposed in unethical activities such as illegal surveillance and blagging to name some. In this respect, this study aims to uncover the ethical orientations of investigators using cluster analysis.

Design/methodology/approach

This study is based upon an online survey of private investigators predominantly in the UK, i.e. investigators beyond the public police. An innovate statistical inferential analysis was used to investigate the sample which resulted in the development of three ethical orientations of such investigators.

Findings

Based upon a survey response from 331 of these types of investigators this study illustrates the extent they engage in unethical activities, showing a very small minority of largely private investigators who engage in such activities.

Originality/value

A unique feature of this study is the use of an innovative statistical approach using an unsupervised machine learning model, namely, TwoStep cluster analysis, to successfully group and classify respondents based on their ethical orientation. The model derived three types of ethical orientation: ethical, inbetweeners and risk takers.

Details

Journal of Financial Crime, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1359-0790

Keywords

Abstract

Details

Understanding Intercultural Interaction: An Analysis of Key Concepts, 2nd Edition
Type: Book
ISBN: 978-1-83753-438-8

Article
Publication date: 1 March 2024

Joshua Nterful, Ibrahim Osman Adam, Muftawu Dzang Alhassan, Abdallah Abdul-Salam and Abubakar Gbambegu Umar

This paper aims to identify the critical success factors in improving information security in Ghanaian firms.

Abstract

Purpose

This paper aims to identify the critical success factors in improving information security in Ghanaian firms.

Design/methodology/approach

Through an exploratory study of both public and private Ghanaian organizations. The study relied on a research model based on the technology–organization–environment (TOE) framework and a survey instrument to collect data from 525 employees. The data was analyzed using partial least squares-structural equation modeling (PLS-SEM).

Findings

The findings confirm the role of the technological, organizational and environmental contexts as significant determinants in the implementation of information security in Ghanaian organizations. Results from PLS-SEM analysis demonstrated a positive correlation between the technology component of information security initiative, organization’s internal efforts toward its acceptance and a successful implementation of information security in Ghanaian firms. Top management support and fund allocation among others will result in positive information security initiatives and positive attitudes toward securing the organization’s information assets.

Research limitations/implications

The authors discussed the implications of the authors’ findings for research, practice and policy.

Social implications

The results of this study will be useful for both governmental and non-governmental organizations in terms of best practices for increasing information security. Results from this study will aid organizations in developing countries to better understand their information security needs and identify the necessary procedures to address them.

Originality/value

This study contributes to filling the knowledge gap in organizational information security research and the TOE framework. Despite the TOE framework being one of the most influential theories in contemporary research of information system domains in an organizational context, there is not enough research linking the domains of information security and the TOE model.

Details

Information & Computer Security, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 29 February 2024

Yuxiao Ye, Yiting Han and Baofeng Huo

In this research, we explore the adverse impact of foreign ownership on operational security, a critical operational implication of the liability of foreignness (LOF).

Abstract

Purpose

In this research, we explore the adverse impact of foreign ownership on operational security, a critical operational implication of the liability of foreignness (LOF).

Design/methodology/approach

The empirical analysis is based on a multi-country dataset from the World Bank Enterprises Survey, which contains detailed firm-level information from over 8,902 firms in 82 emerging market countries. We perform a series of robustness checks to further confirm our findings.

Findings

We find that a high ratio of foreign ownership is associated with an increased likelihood of security breaches and higher security costs. Our results also indicate that high levels of host countries’ institutional quality and firms’ local embeddedness can mitigate such vulnerability in operational security.

Originality/value

This study is one of the first to uncover the critical operational implication of the LOF, indicating that a high ratio of foreign ownership exposes firms to operational security challenges.

Details

International Journal of Operations & Production Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0144-3577

Keywords

Article
Publication date: 31 May 2023

Darshana Palkar

Existing studies suggest that negative impacts emanating from corporate fraud revelations may diffuse to other firms through lower trust and lower market participation. Extending…

Abstract

Purpose

Existing studies suggest that negative impacts emanating from corporate fraud revelations may diffuse to other firms through lower trust and lower market participation. Extending this literature stream, the authors examine whether corporate fraud revelations are associated with higher costs of raising capital through initial public offerings (IPOs) for industry peers.

Design/methodology/approach

The authors employ several analysis techniques including univariate analysis, multivariate regressions, propensity score matching methodology, and probit estimation. The sample consists of 3,015 US IPO firms for the 1996–2021 period.

Findings

By adopting US private securities class action lawsuits as a proxy for the presence of corporate fraud, the authors find that fraud revelations are associated with higher IPO underpricing, higher post-IPO stock return volatility and increased likelihood of withdrawal from the offering for industry peers. The findings are robust to alternative industry definitions and litigation proxies and to the inclusion of a battery of controls, including industry, state and year fixed effects.

Originality/value

This study presents private firms with an additional industry litigation factor to consider when assessing the marginal costs of going public.

Details

International Journal of Managerial Finance, vol. 20 no. 2
Type: Research Article
ISSN: 1743-9132

Keywords

Open Access
Article
Publication date: 1 August 2023

Areej Alyami, David Sammon, Karen Neville and Carolanne Mahony

Cyber security has never been more important than it is today in an ever more connected and pervasive digital world. However, frequently reported shortages of suitably skilled and…

1988

Abstract

Purpose

Cyber security has never been more important than it is today in an ever more connected and pervasive digital world. However, frequently reported shortages of suitably skilled and trained information system (IS)/cyber security professionals elevate the importance of delivering effective Security Education,Training and Awareness (SETA) programmes within organisations. Therefore, the purpose of this study is the questionable effectiveness of SETA programmes at changing employee behaviour and an absence of empirical studies on the critical success factors (CSFs) for SETA programme effectiveness.

Design/methodology/approach

This exploratory study follows a three-stage research design to give voice to practitioners with SETA programme expertise. Data is gathered in Stage 1 using semi-structured interviews with 20 key informants (the emergence of the CSFs), in Stage 2 from 65 respondents to a short online survey (the ranking of the CSFs) and in Stage 3 using semi-structured interviews with nine IS/cyber security practitioners (the emergence of the guiding principles). Using a multi-stage research design allows the authors to propose and evaluate the 11 CSFs for SETA programme effectiveness.

Findings

This study conducted a mean score analysis to evaluate the level of importance of each CSF within two independent groups of IS/cyber security professionals. This multi-stage analysis produces a ranked list of 11 CSFs for SETA programme effectiveness, while the difference in the rankings leads to the emergence of five CSF-specific guiding principles (to increase the likelihood of delivering an effective SETA programme within an organisational context). This analysis also reveals that most of the contradictions/differences in CSF rankings between IS/cyber security practitioners are linked to the design phase of the SETA programme life cycle. While two CSFs, “maintain quarterly evaluation of employee performance” (CSF-DS6) and “build security awareness campaigns” (CSF-EV1), represent the most significant contradiction in this study.

Originality/value

The 11 CSFs for SETA programme effectiveness, along with the five CSF-specific guiding principles, provide a greater depth of knowledge contributing to both theory and practice and lays the foundation for future studies. Therefore, the outputs of this study provide valuable insights on the areas that practice needs to get right to deliver effective SETA programmes.

Details

Information & Computer Security, vol. 32 no. 1
Type: Research Article
ISSN: 2056-4961

Keywords

1 – 10 of over 1000