Search results

1 – 10 of 137
Article
Publication date: 17 April 2024

Dirk H.R. Spennemann, Jessica Biles, Lachlan Brown, Matthew F. Ireland, Laura Longmore, Clare L. Singh, Anthony Wallis and Catherine Ward

The use of generative artificial intelligence (genAi) language models such as ChatGPT to write assignment text is well established. This paper aims to assess to what extent genAi…

Abstract

Purpose

The use of generative artificial intelligence (genAi) language models such as ChatGPT to write assignment text is well established. This paper aims to assess to what extent genAi can be used to obtain guidance on how to avoid detection when commissioning and submitting contract-written assignments and how workable the offered solutions are.

Design/methodology/approach

Although ChatGPT is programmed not to provide answers that are unethical or that may cause harm to people, ChatGPT’s can be prompted to answer with inverted moral valence, thereby supplying unethical answers. The authors tasked ChatGPT to generate 30 essays that discussed the benefits of submitting contract-written undergraduate assignments and outline the best ways of avoiding detection. The authors scored the likelihood that ChatGPT’s suggestions would be successful in avoiding detection by markers when submitting contract-written work.

Findings

While the majority of suggested strategies had a low chance of escaping detection, recommendations related to obscuring plagiarism and content blending as well as techniques related to distraction have a higher probability of remaining undetected. The authors conclude that ChatGPT can be used with success as a brainstorming tool to provide cheating advice, but that its success depends on the vigilance of the assignment markers and the cheating student’s ability to distinguish between genuinely viable options and those that appear to be workable but are not.

Originality/value

This paper is a novel application of making ChatGPT answer with inverted moral valence, simulating queries by students who may be intent on escaping detection when committing academic misconduct.

Details

Interactive Technology and Smart Education, vol. 21 no. 4
Type: Research Article
ISSN: 1741-5659

Keywords

Article
Publication date: 1 October 2024

Abdulaziz Mardenli, Dirk Sackmann, Alexandra Fiedler, Sebastian Rhein and Mohammad Alghababsheh

With its presence, which can create inefficiencies, uncertainties and risks, information asymmetry poses a significant challenge to successfully managing the agri-food supply…

Abstract

Purpose

With its presence, which can create inefficiencies, uncertainties and risks, information asymmetry poses a significant challenge to successfully managing the agri-food supply chain (AFSC). Understanding the variables that influence information asymmetry is crucial for devising more effective strategies to mitigate it. This study, therefore, explores the variables that influence information asymmetry in the AFSC.

Design/methodology/approach

A qualitative analysis was conducted, relying on semi-structured interviews with 17 experts representing different actors in the AFSC (e.g. seed producers, retailers, etc.) in Germany. The collected data was analysed using the GABEK® method.

Findings

The study confirms that the influencing variables derived from the existing theory, such as price performance, digitalisation, environmental, process and quality measures, contribute to information asymmetry. It further reveals new variables that associate with information asymmetry, including documentation requirements, increasing regulation, consumer behaviour, incorrect data within the company as well as crises, political conflicts and supplier–buyer conflicts. Furthermore, the study shows that supply chain actors counteract asymmetry by focusing on social behaviour and monitoring suppliers through key performance indicators, employees and social aspects.

Research limitations/implications

The study was limited to the universal influence of the variables on information asymmetry in the AFSC, making the magnitude of the influence and its context-specific nature unexplained.

Originality/value

This study is one of the very few that examines information asymmetry across the AFSC from the perspective of different actors, providing a more overarching and deeper understanding of information asymmetry.

Details

The International Journal of Logistics Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0957-4093

Keywords

Article
Publication date: 11 October 2024

Rosalind Searle, Karen V. Renaud and Lisa van der Werff

Adverse cyber events, like death and taxes, have become inevitable. They are an increasingly common feature of organisational life. Their aftermaths are a critical and…

Abstract

Purpose

Adverse cyber events, like death and taxes, have become inevitable. They are an increasingly common feature of organisational life. Their aftermaths are a critical and under-examined context and dynamic space within which to examine trust. In this paper, we address this deficit.

Design/methodology/approach

Drawing on pertinent theory and reports of empirical studies, we outline the basis of two alternative subsequent trajectories, drawing out the relationships between trust, vulnerability and emotion, both positive and negative, in the aftermath of an adverse cyber event.

Findings

We combine stage theory and social information processing theories to delineate the dynamics of trust processes and their multilevel trajectories during adverse cyber event aftermaths. We consider two response trajectories to chart the way vulnerability arises at different levels within these social systems to create self-reinforcing trust and distrust spirals. These ripple out to impact multiple levels of the organisation by either amplifying or relieving vulnerability.

Research limitations/implications

The way adverse cyber events aftermaths are managed has immediate and long-term consequences for organisational stakeholders. Actions impact resilience and the ability to preserve the social fabric of the organisations. Subsequent trajectories can be “negative” or “positive”. The “negative” trajectory is characterised by efforts to identify and punish the employee whose actions facilitated the adverse events, i.e. the “who”. Public scapegoating might follow thereby amplifying perceived vulnerability and reducing trust across the board. By contrast, the “positive” trajectory relieves perceived vulnerability by focusing on, and correcting, situational causatives. Here, the focus is on the “what” and “why” of the event.

Practical implications

We raise the importance of responding in a constructive way to adverse cyber events.

Originality/value

The aftermaths of cyber attacks in organisations are a critical, neglected context. We explore the interplay between trust and vulnerability and its implications for management “best practice”.

Details

Journal of Intellectual Capital, vol. 25 no. 5/6
Type: Research Article
ISSN: 1469-1930

Keywords

Article
Publication date: 17 June 2024

Alexandros Psychogios, Leslie T.T. Szamosi, Rea Prouska and Dritjon Gruda

The purpose of this study is to understand how managers in entrepreneurial small businesses (ESBs) deal with exogenous (macro) crises, particularly in relation to the breakdown…

Abstract

Purpose

The purpose of this study is to understand how managers in entrepreneurial small businesses (ESBs) deal with exogenous (macro) crises, particularly in relation to the breakdown of intra- and inter-stakeholder trust.

Design/methodology/approach

Utilising a qualitative approach, we draw lessons from Greek ESBs greatly affected by the 2008–2019 economic and 2020–2022 health crises. Based on 54 in-depth, longitudinal investigations of four ESBs at three time points, this research offers insights on overcoming organisation-stakeholder trust breakdowns that emerg due to crises.

Findings

The findings suggest that macro-level crises undermined the foundations of trust-based relationships, creating a trust gap between organisations and their stakeholders and threatening ESBs’ business practices. Our framework suggests that ESBs repair trust relationships, both intra- and inter-organisational, through sense-making of trust breakdown, implementing trust-repair strategies, and then maintaining trust in those stakeholder relationships through challenging crisis periods.

Practical implications

Practitioners can use the suggested framework in relation to overcoming intra- and inter-stakeholder trust breakdowns during macro-level crises.

Originality/value

The paper offers a new framework that can aid entrepreneurs and managers in making sense of repairing and maintaining trust in stakeholder relationships during turbulent times.

Details

Journal of Small Business and Enterprise Development, vol. 31 no. 6
Type: Research Article
ISSN: 1462-6004

Keywords

Article
Publication date: 13 September 2024

Yu (Jade) Chu and Yanji Duan

While size asymmetry in buyer–supplier relationships has been studied in non-disruption contexts, this research explores how supplier size influences positive and negative supply…

Abstract

Purpose

While size asymmetry in buyer–supplier relationships has been studied in non-disruption contexts, this research explores how supplier size influences positive and negative supply chain disruptions. Anchoring on the commitment-trust theory (CTT), we explore buyer commitment as a mediating variable and examine how buying firms' mediated power usage depends on different supplier sizes and types of supplier-induced disruptions.

Design/methodology/approach

Through two scenario-based behavioral experiments, we discover different patterns in buyers' use of mediated power, contingent on the types of supplier-induced disruptions.

Findings

In negative disruptions, buyers prefer more mediated power with large suppliers to control uncertainties, using reward or coercive power strategies. In positive disruptions, we find opposite results, indicating different buyers' perceptions and actions are contingent on both the supplier size and the types of disruptions. These findings underscore the complex interplay between supplier size, buyer commitment and mediated power strategies, revealing that disruption type significantly shapes buyer responses.

Research limitations/implications

This paper extends the CTT framework by considering new antecedents and outcomes. We also provide a more comprehensive understanding of buyer behavior when facing positive and negative supplier-induced disruptions. Our study has limitations. Through vignette-based behavioral experiments, there is a risk that scenarios may not accurately represent real-life situations and that decision-making dynamics could be oversimplified. Future research should incorporate nuanced measurements and conduct additional qualitative research for a comprehensive understanding.

Originality/value

This study enriches the understanding of the buyer-supplier relationship by expanding the CTT framework for a more comprehensive picture. We also offer nuanced insights into size dynamics and disruption types, emphasizing tailored strategies in supply chain management. The findings underscore the importance of understanding these nuances to employ tailored strategy in a business-to-business (B2B) context, as mediated power is contingent on multiple factors.

Details

The International Journal of Logistics Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0957-4093

Keywords

Abstract

Details

Interactive Technology and Smart Education, vol. 21 no. 4
Type: Research Article
ISSN: 1741-5659

Article
Publication date: 7 July 2023

Steven Muzatko and Gaurav Bansal

This research examines the relationship between the timeliness in announcing the discovery of a data breach and consumer trust in an e-commerce company, as well as later…

Abstract

Purpose

This research examines the relationship between the timeliness in announcing the discovery of a data breach and consumer trust in an e-commerce company, as well as later trust-rebuilding efforts taken by the company to compensate users impacted by the breach.

Design/methodology/approach

A survey experiment was used to examine the effect of both trust-reducing events (announced data breaches) and trust-enhancing events (provision of identity theft protection and credit monitoring) on consumer trust. The timeliness of the breach announcement by an e-commerce company was manipulated between two randomly assigned groups of subjects; one group viewed an announcement of the breach immediately upon its discovery, and the other viewed an announcement made two months after the breach was discovered. Consumer trust was measured before the breach, after the breach was announced, and finally, after the announcement of data protection.

Findings

The results suggest that companies that delay a data breach announcement are likely to suffer a larger drop in consumer trust than those that immediately disclose the data breach. The results also suggest that trust can be repaired by providing data protection. However, even after providing identity theft protection and credit monitoring, companies that fail to promptly disclose a breach have lower repaired trust than companies that promptly disclose.

Originality/value

This study contributes to the literature on e-commerce trust by examining how a company's forthrightness in reporting a data breach impacts user trust at the time of the disclosure of the data breach and after subsequent efforts to repair trust.

Details

Internet Research, vol. 34 no. 5
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 3 April 2024

Petter Gottschalk

The purpose of this paper is to discuss the legal barriers to termination of an insurance arrangement where there is suspicion of money laundering when paying insurance premiums.

Abstract

Purpose

The purpose of this paper is to discuss the legal barriers to termination of an insurance arrangement where there is suspicion of money laundering when paying insurance premiums.

Design/methodology/approach

Trials in court between insurance firm and outlaw biker gangs regarding insurance of their clubhouses.

Findings

Protection of insured seems more important than prevention of money laundering.

Research limitations/implications

This is a case study that cannot be generalized.

Practical implications

Anti money laundering is difficult when competing with other considerations.

Social implications

Accusations of money laundering is not sufficient to terminate an insurance contract. Rather, solid evidence is needed.

Originality/value

This is a real case of failing anti-money laundering efforts.

Details

Journal of Money Laundering Control, vol. 27 no. 6
Type: Research Article
ISSN: 1368-5201

Keywords

Book part
Publication date: 28 November 2024

Patricia Ahmed, Rebecca Jean Emigh and Dylan Riley

A “state-driven” approach suggests that colonists use census categories to rule. However, a “society-driven” approach suggests that this state-driven perspective confers too much…

Abstract

A “state-driven” approach suggests that colonists use census categories to rule. However, a “society-driven” approach suggests that this state-driven perspective confers too much power upon states. A third approach views census-taking and official categorization as a product of state–society interaction that depends upon: (a) the population's lay categories, (b) information intellectuals' ability to take up and transform these lay categories, and (c) the balance of power between social and state actors. We evaluate the above positions by analyzing official records, key texts, travelogues, and statistical memoirs from three key periods in India: Indus Valley civilization through classical Gupta rule (ca. 3300 BCE–700 CE), the “medieval” period (ca. 700–1700 CE), and East India Company (EIC) rule (1757–1857 CE), using historical narrative. We show that information gathering early in the first period was society driven; however, over time, a strong interactive pattern emerged. Scribes (information intellectuals) increased their social status and power (thus, shifting the balance of power) by drawing on caste categories (lay categories) and incorporating them into official information gathering. This intensification of interactive information gathering allowed the Mughals, the EIC, and finally British direct rule officials to collect large quantities of information. Our evidence thus suggests that the intensification of state–society interactions over time laid the groundwork for the success of the direct rule British censuses. It also suggests that any transformative effect of these censuses lay in this interactive pattern, not in the strength of the British colonial state.

Details

Elites, Nonelites, and Power
Type: Book
ISBN: 978-1-83797-583-9

Keywords

Abstract

Details

Hegemonic Masculinity, Caste, and the Body
Type: Book
ISBN: 978-1-80117-362-9

1 – 10 of 137