Search results

1 – 10 of over 1000
Per page
102050
Citations:
Loading...
Access Restricted. View access options
Article
Publication date: 1 February 1980

A.V. Katos

The purpose of this paper is to analyse the possible effects of an economic integration of Portugal, Spain and Greece with the EEC upon the welfare of the region with respect to…

112

Abstract

The purpose of this paper is to analyse the possible effects of an economic integration of Portugal, Spain and Greece with the EEC upon the welfare of the region with respect to dynamic effects (such as changes in relative efficiency). To achieve this an ex‐ante model is employed making use of data adjusted for the purchasing power of the different currencies.

Details

Journal of Economic Studies, vol. 7 no. 2
Type: Research Article
ISSN: 0144-3585

Access Restricted. View access options
Article
Publication date: 1 May 1983

In the last four years, since Volume I of this Bibliography first appeared, there has been an explosion of literature in all the main functional areas of business. This wealth of…

16778

Abstract

In the last four years, since Volume I of this Bibliography first appeared, there has been an explosion of literature in all the main functional areas of business. This wealth of material poses problems for the researcher in management studies — and, of course, for the librarian: uncovering what has been written in any one area is not an easy task. This volume aims to help the librarian and the researcher overcome some of the immediate problems of identification of material. It is an annotated bibliography of management, drawing on the wide variety of literature produced by MCB University Press. Over the last four years, MCB University Press has produced an extensive range of books and serial publications covering most of the established and many of the developing areas of management. This volume, in conjunction with Volume I, provides a guide to all the material published so far.

Details

Management Decision, vol. 21 no. 5
Type: Research Article
ISSN: 0025-1747

Keywords

Access Restricted. View access options
Article
Publication date: 13 July 2012

Vasilios Katos

The purpose of this paper is to develop a model for online transactions, integrating the social influence approach, the trust‐risk framework, and the theory of reasoned action…

912

Abstract

Purpose

The purpose of this paper is to develop a model for online transactions, integrating the social influence approach, the trust‐risk framework, and the theory of reasoned action, and to test it in a non US/UK context such as Greece.

Design/methodology/approach

Structural equation modeling was used to survey data from 376 household respondents from two residential departments of the city of Thessaloniki in Greece in order to examine causal inferences.

Findings

The results of the model, where the trust‐risk‐subjective norms framework mediated the impact of information privacy on actual transactions, indicated that the individual's attitude toward using technology, through the intention to submit individual information, resulted in positive actual transaction outcomes.

Research limitations/implications

Cross‐section data were used for testing the model. However, for properly investigating causality time‐series or longitudinal data should be employed.

Practical implications

For increasing online transactions, organizations should make their websites as simple and attractive as possible, develop their image that they do care about customers and are trustworthy, and develop privacy‐friendly policies for gaining competitive advantage.

Originality/value

This study proposes and empirically validates an integrative framework for online transactions at the individual level by adapting information privacy concerns and trust‐risk‐subjective norm beliefs and relates them to attitudes of individuals. Thus, the proposed integrative framework is critically engaging and well established but with limited information models.

Details

Information Management & Computer Security, vol. 20 no. 3
Type: Research Article
ISSN: 0968-5227

Keywords

Access Restricted. View access options
Article
Publication date: 22 March 2011

Alain Y.L. Chong, Felix T.S. Chan, K.B. Ooi and J.J. Sim

The purpose of this paper is to empirically test a framework which identifies the relationships between supply chain management (SCM) practices, operational performance and…

5319

Abstract

Purpose

The purpose of this paper is to empirically test a framework which identifies the relationships between supply chain management (SCM) practices, operational performance and innovation performance of Malaysian manufacturing and service firms.

Design/methodology/approach

Data for the study were collected from a sample of 163 Malaysian manufacturing and service firms. The research model was tested using structural equation modeling.

Findings

The results show that SCM practices in both the upstream and downstream supply chain have a direct and significant impact on organizational and innovation performance of Malaysian firms. Innovation improvement caused by SCM also results in better organizational performance. The findings also reveal that manufacturing and service firms in Malaysia do not have a significant difference in their SCM practices.

Research limitations/implications

The time sequence of the association between the variables could not be concluded given that cross‐sectional data were used. This study also focuse only on Malaysian firms.

Practical implications

This paper shows the importance of SCM practices and how they directly influence organizational and innovation performance. This result will be encouraging to firms in other developing countries. This paper has developed and validated a multi‐dimensional construct of SCM practices, and this tool can assist decision makers of Malaysian firms to evaluate the efficiency of their current SCM practices.

Originality/value

The paper presents one of the few studies which empirically validates the relationships between SCM practices and organizational and innovation performances. The study also focuses on a developing country which is in transition from being manufacturing focused to service focused.

Details

Industrial Management & Data Systems, vol. 111 no. 3
Type: Research Article
ISSN: 0263-5577

Keywords

Access Restricted. View access options
Article
Publication date: 29 July 2014

Changiz Valmohammadi

This study aims to provide reliable and valid constructs of corporate social responsibility (CSR) and a measurement instrument in the context of Iranian organizations based on the…

4248

Abstract

Purpose

This study aims to provide reliable and valid constructs of corporate social responsibility (CSR) and a measurement instrument in the context of Iranian organizations based on the seven core subjects of International Organization for Standardization (ISO) 26000 standard. It also examines the effects of these seven CSR criteria, namely, organizational governance, human rights, labor practices, the environment, fair operating practices, consumer issues and community involvement, and development on the organizational performance of Iranian organizations.

Design/methodology/approach

Through an extensive study of literature review, the related items of these core subjects were identified. Data for the study were collected from 207 Iranian manufacturing and service firms. The research model was tested using structural equation modeling.

Findings

Statistical analysis revealed that a number of significant relationships between CSR practices and organizational performance of Iranian organizations. The result found that community involvement and development plays an important role in enhancing organizational performance of organizations.

Research limitations/implications

First, the time sequence of the association between the variables could not be concluded, given that cross-sectional data were used. A future study is suggested to conduct a longitudinal research design to present the evidence of causation which cannot be achieved through cross-sectional designs. Second, this study was limited to Iran. Hence, the findings and conclusions drawn from this research are representative of the Iranian context only. Hence, final results should be considered with caution.

Practical implications

This study offers a number of implications for Iranian managers and policy-makers. First, this study identified that there is a relationship between CSR practices based on the seven core subjects of ISO 26000 and firm performance in the context of Iran. Second, the instrument developed, in this research, will be very useful to policy-makers in various industries of Iran as a tool for evaluating the effectiveness of their current CSR practices and initiatives. Third, decision-makers can also prioritize the CSR practices on which their firms should focus to improve their organizational performance.

Originality/value

The novelty of this research is to determine the related items of the core subjects of ISO 26000 as the main factors and offer an instrument to measure the effects of various CSR practices on organizational performance of Iranian firms in the context of Iran.

Details

Social Responsibility Journal, vol. 10 no. 3
Type: Research Article
ISSN: 1747-1117

Keywords

Access Restricted. View access options
Article
Publication date: 12 July 2013

Mahmood Hajli

Social relationships on the internet through the emergence of Web 2.0 applications created new opportunities for business. This is mainly because of the growth of social…

9109

Abstract

Purpose

Social relationships on the internet through the emergence of Web 2.0 applications created new opportunities for business. This is mainly because of the growth of social networking sites, which has also developed e‐commerce. The current development in e‐commerce opened a new stream, entitled social commerce, which is using social technologies to create an environment for generating social interactions. These social interactions can drive online social support in e‐commerce, which in turn is creating trust and an increased intention to use social commerce.

Design/methodology/approach

This research used social support theory and related theories on intention to use to propose a theoretical framework for the adoption of social commerce.

Findings

The model predicts that forums and communities, ratings, reviews, referrals and recommendations are helping to introduce new business plans for e‐vendors. The model also shows trust is an on‐going issue in e‐commerce and can be built through social commerce constructs.

Research limitations/implications

There is limited research in the area of social commerce which this study seeks to redress. This study proposes a new model which can be extended by other constructs. However, the research needs to empirically test the constructs of the proposed model and their relationship.

Originality/value

This paper introduces social commerce constructs, namely; recommendations and referrals, forums and communities and rating and reviews. The bases of the model proposed in this research are IT adoption and literature in the area such as PU and intention to buy or trust. These highlight the key role of ICT in the behaviour of online customers. This can be a development for e‐commerce adoption models and the results signify that IS has a reference discipline for the behaviour of online consumers. This is an issue in marketing where not enough attention is paid to the importance of IT and IS.

Details

Information Management & Computer Security, vol. 21 no. 3
Type: Research Article
ISSN: 0968-5227

Keywords

Access Restricted. View access options
Article
Publication date: 14 October 2013

Janice C. Sipior, Burke T. Ward and Regina Connolly

The purpose of this paper is to revisit the internet users’ information privacy concerns (IUIPC) construct, a research model, and hypotheses based on Malhotra et al. (2004) to…

1022

Abstract

Purpose

The purpose of this paper is to revisit the internet users’ information privacy concerns (IUIPC) construct, a research model, and hypotheses based on Malhotra et al. (2004) to assess the continued applicability of this construct. The relationship among privacy concerns, trusting beliefs, and risk beliefs continues to be unclear. Empirical evidence about the impact of privacy concerns on behavior is mixed.

Design/methodology/approach

A paper-based questionnaire was distributed and collected from 63 part-time graduate students of a private university in the mid-Atlantic USA. These respondents have an average of six years of full-time professional work experience and the vast majority (88.9 percent) has over seven years of experience on the internet. Questionnaire items measured the constructs of the IUIPC instrument. All measurement scales were validated using factor analysis, Cronbach's α, and reliability analysis. For hypothesis testing, multiple regression analysis was used.

Findings

The results partially support those of Malhotra et al. (2004). Consistent are the findings that the higher the trust a consumer holds for an online company, the less likely that consumer is to view providing personal information as risky. Also consistent is that the higher the trust a consumer holds for an online company, the more likely is that consumer to intend to provide personal information online. Finally, the greater risk a consumer has for providing personal information, the less willing that consumer is to reveal such information online. However, the results did not support a negative relationship between the IUIPC construct and consumer trust in an online company or a positive relationship between IUIPC and consumer risk in providing personal information to an online company. The paper concludes that the IUIPC is not the valid scale to employ in measuring information privacy concerns.

Research limitations/implications

The main limitation of the findings is the use of a small convenience sample, limiting the insights into interrelationships between various dimensions of privacy concerns and the generalizability of the results.

Practical implications

The results may provide guidance to online retailers in addressing the dimensions of privacy concerns related to trusting beliefs and risk beliefs.

Originality/value

IUIPC were measured using the IUIPC instrument. This responds to Malhotra et al.'s (2004) call to use the IUIPC scale and the associated research framework to further investigate consumer privacy concerns and the suggestion by Belanger and Crossler (2011) that more studies should explore this scale. Further, both Westin (1967), and Smith et al. (1996) recognize that privacy attitudes and concerns may change over time, providing motivation to revisit IUIPC.

Details

Journal of Enterprise Information Management, vol. 26 no. 6
Type: Research Article
ISSN: 1741-0398

Keywords

Access Restricted. View access options
Article
Publication date: 2 July 2018

Angela S.M. Irwin and Adam B. Turner

The purpose of this paper is to highlight the intelligence and investigatory challenges experienced by law enforcement agencies in discovering the identity of illicit Bitcoin…

2611

Abstract

Purpose

The purpose of this paper is to highlight the intelligence and investigatory challenges experienced by law enforcement agencies in discovering the identity of illicit Bitcoin users and the transactions that they perform. This paper proposes solutions to assist law enforcement agencies in piecing together the disparate and complex technical, behavioural and criminological elements that make up cybercriminal offending.

Design/methodology/approach

A literature review was conducted to highlight the main law enforcement challenges and discussions and examine current discourse in the areas of anonymity and attribution. The paper also looked at other research and projects that aim to identify illicit transactions involving cryptocurrencies and the darknet.

Findings

An optimal solution would be one which has a predictive capability and a machine learning architecture which automatically collects and analyses data from the Bitcoin blockchain and other external data sources and applies search criteria matching, indexing and clustering to identify suspicious behaviours. The implementation of a machine learning architecture would help improve results over time and would be less manpower intensive. Cyber investigators would also receive intelligence in a format and language that they understand and it would allow for intelligence-led and predictive policing rather than reactive policing. The optimal solution would be one which allows for intelligence-led, predictive policing and enables and encourages information sharing between multiple stakeholders from the law enforcement, financial intelligence units, cyber security organisations and fintech industry. This would enable the creation of red flags and behaviour models and the provision of up-to-date intelligence on the threat landscape to form a viable intelligence product for law enforcement agencies so that they can more easily get to the who, what, when and where.

Originality/value

The development of a functional software architecture that, in theory, could be used to detected suspicious illicit transactions on the Bitcoin network.

Details

Journal of Money Laundering Control, vol. 21 no. 3
Type: Research Article
ISSN: 1368-5201

Keywords

Access Restricted. View access options
Article
Publication date: 20 March 2024

Ray Sastri, Fanglin Li, Hafiz Muhammad Naveed and Arbi Setiyawan

The COVID-19 pandemic severely impacted tourism, and the hotel and restaurant industry was the most affected sector, which faced issues related to business uncertainty and…

78

Abstract

Purpose

The COVID-19 pandemic severely impacted tourism, and the hotel and restaurant industry was the most affected sector, which faced issues related to business uncertainty and unemployment during the crisis. The analysis of recovery time and the influence factors is significant to support policymakers in developing an effective response and mitigating the risks associated with the tourism crisis. This study aims to investigate numerous factors affecting the recovery time of the hotel and restaurant sector after the COVID-19 crisis by using survival analysis.

Design/methodology/approach

This study uses the quarterly value added with the observation time from quarter 1 in 2020 to quarter 1 in 2023 to measure the recovery status. The recovery time refers to the number of quarters needed for the hotel and restaurant sector to get value added equal to or exceed the value added before the crisis. This study applies survival models, including lognormal regression, Weibull regression, and Cox regression, to investigate the effect of numerous factors on the hazard ratio of recovery time of hotels and restaurants after the COVID-19 crisis. This model accommodates all cases, including “recovered” and “not recovered yet” areas.

Findings

The empirical findings represented that the Cox regression model stratified by the area type fit the data well. The priority tourism areas had a longer recovery time than the non-priority areas, but they had a higher probability of recovery from a crisis of the same magnitude. The size of the regional gross domestic product, decentralization funds, multiplier effect, recovery time of transportation, and recovery time of the service sector had a significant impact on the probability of recovery.

Originality/value

This study contributes to the literature by examining the recovery time of the hotel and restaurant sector across Indonesian provinces after the COVID-19 crisis. Employing survival analysis, this study identifies the pivotal factors affecting the probability of recovery. Moreover, this study stands as a pioneer in investigating the multiplier effect of the regional tourism and its impact on the speed of recovery.

Details

Kybernetes, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0368-492X

Keywords

Access Restricted. View access options
Article
Publication date: 9 November 2015

Himanshu Srivastava and Shashikala Tapaswi

The purpose of this paper is to propose an approach that helps in acquisition of live data as well as data stored in the internal/external memory of android mobile device…

1511

Abstract

Purpose

The purpose of this paper is to propose an approach that helps in acquisition of live data as well as data stored in the internal/external memory of android mobile device considering that the data on the device are not much altered during the extraction process. Also, the emphasis is laid on testing the validity of existing forensic tools against the data obtained manually and by using this approach. Smartphones have spurred the mobile computing technology, and Android is widely used as an Operating System in these devices. These days, users store most of their personal information like emails, images, contacts etc., on Phones/Tablets as their data would be readily accessible and thus convenient for them.

Design/methodology/approach

Android Operating System is built on the Linux Kernel and scripts to extract data from Android Mobile Device with the use of Android Debugging Bridge have been written. The approach is more focused on the logical acquisition of data from devices rather than acquisition using physical methods.

Findings

Live data of the Facebook application running on the device can be extracted. Also, the password of the LuksManager application (used to create an encrypted volume on the device), which is stored in the internal memory, is also extracted and identified.

Research limitations/implications

The study has been conducted in an academic environment, thereby limiting external validity. Another limitation is the limited edition of some of the software forensics tools that are used. The full access to these software tools are restricted by Law enforcement and Investigation policies. The research provides a different approach which could aid in criminal investigation activities on mobile devices.

Practical implications

The devices which have the latest versions of Android not only store messages and mails, but a lot of information about GPS, as well as information about popular applications like Facebook, WhatsApp, etc. This could practically help a lot in criminal investigation.

Originality/value

This study is important because very few works have been done on recent versions (Jellybean and Kitkat) of Android. The proposed approach could extract large amounts of information as compared to earlier approaches with the newer versions of Android having larger memory and new features.

Details

Information & Computer Security, vol. 23 no. 5
Type: Research Article
ISSN: 2056-4961

Keywords

1 – 10 of over 1000
Per page
102050