Search results
1 – 10 of 137Dirk H.R. Spennemann, Jessica Biles, Lachlan Brown, Matthew F. Ireland, Laura Longmore, Clare L. Singh, Anthony Wallis and Catherine Ward
The use of generative artificial intelligence (genAi) language models such as ChatGPT to write assignment text is well established. This paper aims to assess to what extent genAi…
Abstract
Purpose
The use of generative artificial intelligence (genAi) language models such as ChatGPT to write assignment text is well established. This paper aims to assess to what extent genAi can be used to obtain guidance on how to avoid detection when commissioning and submitting contract-written assignments and how workable the offered solutions are.
Design/methodology/approach
Although ChatGPT is programmed not to provide answers that are unethical or that may cause harm to people, ChatGPT’s can be prompted to answer with inverted moral valence, thereby supplying unethical answers. The authors tasked ChatGPT to generate 30 essays that discussed the benefits of submitting contract-written undergraduate assignments and outline the best ways of avoiding detection. The authors scored the likelihood that ChatGPT’s suggestions would be successful in avoiding detection by markers when submitting contract-written work.
Findings
While the majority of suggested strategies had a low chance of escaping detection, recommendations related to obscuring plagiarism and content blending as well as techniques related to distraction have a higher probability of remaining undetected. The authors conclude that ChatGPT can be used with success as a brainstorming tool to provide cheating advice, but that its success depends on the vigilance of the assignment markers and the cheating student’s ability to distinguish between genuinely viable options and those that appear to be workable but are not.
Originality/value
This paper is a novel application of making ChatGPT answer with inverted moral valence, simulating queries by students who may be intent on escaping detection when committing academic misconduct.
Details
Keywords
Abdulaziz Mardenli, Dirk Sackmann, Alexandra Fiedler, Sebastian Rhein and Mohammad Alghababsheh
With its presence, which can create inefficiencies, uncertainties and risks, information asymmetry poses a significant challenge to successfully managing the agri-food supply…
Abstract
Purpose
With its presence, which can create inefficiencies, uncertainties and risks, information asymmetry poses a significant challenge to successfully managing the agri-food supply chain (AFSC). Understanding the variables that influence information asymmetry is crucial for devising more effective strategies to mitigate it. This study, therefore, explores the variables that influence information asymmetry in the AFSC.
Design/methodology/approach
A qualitative analysis was conducted, relying on semi-structured interviews with 17 experts representing different actors in the AFSC (e.g. seed producers, retailers, etc.) in Germany. The collected data was analysed using the GABEK® method.
Findings
The study confirms that the influencing variables derived from the existing theory, such as price performance, digitalisation, environmental, process and quality measures, contribute to information asymmetry. It further reveals new variables that associate with information asymmetry, including documentation requirements, increasing regulation, consumer behaviour, incorrect data within the company as well as crises, political conflicts and supplier–buyer conflicts. Furthermore, the study shows that supply chain actors counteract asymmetry by focusing on social behaviour and monitoring suppliers through key performance indicators, employees and social aspects.
Research limitations/implications
The study was limited to the universal influence of the variables on information asymmetry in the AFSC, making the magnitude of the influence and its context-specific nature unexplained.
Originality/value
This study is one of the very few that examines information asymmetry across the AFSC from the perspective of different actors, providing a more overarching and deeper understanding of information asymmetry.
Details
Keywords
Rosalind Searle, Karen V. Renaud and Lisa van der Werff
Adverse cyber events, like death and taxes, have become inevitable. They are an increasingly common feature of organisational life. Their aftermaths are a critical and…
Abstract
Purpose
Adverse cyber events, like death and taxes, have become inevitable. They are an increasingly common feature of organisational life. Their aftermaths are a critical and under-examined context and dynamic space within which to examine trust. In this paper, we address this deficit.
Design/methodology/approach
Drawing on pertinent theory and reports of empirical studies, we outline the basis of two alternative subsequent trajectories, drawing out the relationships between trust, vulnerability and emotion, both positive and negative, in the aftermath of an adverse cyber event.
Findings
We combine stage theory and social information processing theories to delineate the dynamics of trust processes and their multilevel trajectories during adverse cyber event aftermaths. We consider two response trajectories to chart the way vulnerability arises at different levels within these social systems to create self-reinforcing trust and distrust spirals. These ripple out to impact multiple levels of the organisation by either amplifying or relieving vulnerability.
Research limitations/implications
The way adverse cyber events aftermaths are managed has immediate and long-term consequences for organisational stakeholders. Actions impact resilience and the ability to preserve the social fabric of the organisations. Subsequent trajectories can be “negative” or “positive”. The “negative” trajectory is characterised by efforts to identify and punish the employee whose actions facilitated the adverse events, i.e. the “who”. Public scapegoating might follow thereby amplifying perceived vulnerability and reducing trust across the board. By contrast, the “positive” trajectory relieves perceived vulnerability by focusing on, and correcting, situational causatives. Here, the focus is on the “what” and “why” of the event.
Practical implications
We raise the importance of responding in a constructive way to adverse cyber events.
Originality/value
The aftermaths of cyber attacks in organisations are a critical, neglected context. We explore the interplay between trust and vulnerability and its implications for management “best practice”.
Details
Keywords
Alexandros Psychogios, Leslie T.T. Szamosi, Rea Prouska and Dritjon Gruda
The purpose of this study is to understand how managers in entrepreneurial small businesses (ESBs) deal with exogenous (macro) crises, particularly in relation to the breakdown…
Abstract
Purpose
The purpose of this study is to understand how managers in entrepreneurial small businesses (ESBs) deal with exogenous (macro) crises, particularly in relation to the breakdown of intra- and inter-stakeholder trust.
Design/methodology/approach
Utilising a qualitative approach, we draw lessons from Greek ESBs greatly affected by the 2008–2019 economic and 2020–2022 health crises. Based on 54 in-depth, longitudinal investigations of four ESBs at three time points, this research offers insights on overcoming organisation-stakeholder trust breakdowns that emerg due to crises.
Findings
The findings suggest that macro-level crises undermined the foundations of trust-based relationships, creating a trust gap between organisations and their stakeholders and threatening ESBs’ business practices. Our framework suggests that ESBs repair trust relationships, both intra- and inter-organisational, through sense-making of trust breakdown, implementing trust-repair strategies, and then maintaining trust in those stakeholder relationships through challenging crisis periods.
Practical implications
Practitioners can use the suggested framework in relation to overcoming intra- and inter-stakeholder trust breakdowns during macro-level crises.
Originality/value
The paper offers a new framework that can aid entrepreneurs and managers in making sense of repairing and maintaining trust in stakeholder relationships during turbulent times.
Details
Keywords
While size asymmetry in buyer–supplier relationships has been studied in non-disruption contexts, this research explores how supplier size influences positive and negative supply…
Abstract
Purpose
While size asymmetry in buyer–supplier relationships has been studied in non-disruption contexts, this research explores how supplier size influences positive and negative supply chain disruptions. Anchoring on the commitment-trust theory (CTT), we explore buyer commitment as a mediating variable and examine how buying firms' mediated power usage depends on different supplier sizes and types of supplier-induced disruptions.
Design/methodology/approach
Through two scenario-based behavioral experiments, we discover different patterns in buyers' use of mediated power, contingent on the types of supplier-induced disruptions.
Findings
In negative disruptions, buyers prefer more mediated power with large suppliers to control uncertainties, using reward or coercive power strategies. In positive disruptions, we find opposite results, indicating different buyers' perceptions and actions are contingent on both the supplier size and the types of disruptions. These findings underscore the complex interplay between supplier size, buyer commitment and mediated power strategies, revealing that disruption type significantly shapes buyer responses.
Research limitations/implications
This paper extends the CTT framework by considering new antecedents and outcomes. We also provide a more comprehensive understanding of buyer behavior when facing positive and negative supplier-induced disruptions. Our study has limitations. Through vignette-based behavioral experiments, there is a risk that scenarios may not accurately represent real-life situations and that decision-making dynamics could be oversimplified. Future research should incorporate nuanced measurements and conduct additional qualitative research for a comprehensive understanding.
Originality/value
This study enriches the understanding of the buyer-supplier relationship by expanding the CTT framework for a more comprehensive picture. We also offer nuanced insights into size dynamics and disruption types, emphasizing tailored strategies in supply chain management. The findings underscore the importance of understanding these nuances to employ tailored strategy in a business-to-business (B2B) context, as mediated power is contingent on multiple factors.
Details
Keywords
Steven Muzatko and Gaurav Bansal
This research examines the relationship between the timeliness in announcing the discovery of a data breach and consumer trust in an e-commerce company, as well as later…
Abstract
Purpose
This research examines the relationship between the timeliness in announcing the discovery of a data breach and consumer trust in an e-commerce company, as well as later trust-rebuilding efforts taken by the company to compensate users impacted by the breach.
Design/methodology/approach
A survey experiment was used to examine the effect of both trust-reducing events (announced data breaches) and trust-enhancing events (provision of identity theft protection and credit monitoring) on consumer trust. The timeliness of the breach announcement by an e-commerce company was manipulated between two randomly assigned groups of subjects; one group viewed an announcement of the breach immediately upon its discovery, and the other viewed an announcement made two months after the breach was discovered. Consumer trust was measured before the breach, after the breach was announced, and finally, after the announcement of data protection.
Findings
The results suggest that companies that delay a data breach announcement are likely to suffer a larger drop in consumer trust than those that immediately disclose the data breach. The results also suggest that trust can be repaired by providing data protection. However, even after providing identity theft protection and credit monitoring, companies that fail to promptly disclose a breach have lower repaired trust than companies that promptly disclose.
Originality/value
This study contributes to the literature on e-commerce trust by examining how a company's forthrightness in reporting a data breach impacts user trust at the time of the disclosure of the data breach and after subsequent efforts to repair trust.
Details
Keywords
The purpose of this paper is to discuss the legal barriers to termination of an insurance arrangement where there is suspicion of money laundering when paying insurance premiums.
Abstract
Purpose
The purpose of this paper is to discuss the legal barriers to termination of an insurance arrangement where there is suspicion of money laundering when paying insurance premiums.
Design/methodology/approach
Trials in court between insurance firm and outlaw biker gangs regarding insurance of their clubhouses.
Findings
Protection of insured seems more important than prevention of money laundering.
Research limitations/implications
This is a case study that cannot be generalized.
Practical implications
Anti money laundering is difficult when competing with other considerations.
Social implications
Accusations of money laundering is not sufficient to terminate an insurance contract. Rather, solid evidence is needed.
Originality/value
This is a real case of failing anti-money laundering efforts.
Details
Keywords
Patricia Ahmed, Rebecca Jean Emigh and Dylan Riley
A “state-driven” approach suggests that colonists use census categories to rule. However, a “society-driven” approach suggests that this state-driven perspective confers too much…
Abstract
A “state-driven” approach suggests that colonists use census categories to rule. However, a “society-driven” approach suggests that this state-driven perspective confers too much power upon states. A third approach views census-taking and official categorization as a product of state–society interaction that depends upon: (a) the population's lay categories, (b) information intellectuals' ability to take up and transform these lay categories, and (c) the balance of power between social and state actors. We evaluate the above positions by analyzing official records, key texts, travelogues, and statistical memoirs from three key periods in India: Indus Valley civilization through classical Gupta rule (ca. 3300 BCE–700 CE), the “medieval” period (ca. 700–1700 CE), and East India Company (EIC) rule (1757–1857 CE), using historical narrative. We show that information gathering early in the first period was society driven; however, over time, a strong interactive pattern emerged. Scribes (information intellectuals) increased their social status and power (thus, shifting the balance of power) by drawing on caste categories (lay categories) and incorporating them into official information gathering. This intensification of interactive information gathering allowed the Mughals, the EIC, and finally British direct rule officials to collect large quantities of information. Our evidence thus suggests that the intensification of state–society interactions over time laid the groundwork for the success of the direct rule British censuses. It also suggests that any transformative effect of these censuses lay in this interactive pattern, not in the strength of the British colonial state.
Details