The purpose of this paper is to analyse the possible effects of an economic integration of Portugal, Spain and Greece with the EEC upon the welfare of the region with respect to…
Abstract
The purpose of this paper is to analyse the possible effects of an economic integration of Portugal, Spain and Greece with the EEC upon the welfare of the region with respect to dynamic effects (such as changes in relative efficiency). To achieve this an ex‐ante model is employed making use of data adjusted for the purchasing power of the different currencies.
In the last four years, since Volume I of this Bibliography first appeared, there has been an explosion of literature in all the main functional areas of business. This wealth of…
Abstract
In the last four years, since Volume I of this Bibliography first appeared, there has been an explosion of literature in all the main functional areas of business. This wealth of material poses problems for the researcher in management studies — and, of course, for the librarian: uncovering what has been written in any one area is not an easy task. This volume aims to help the librarian and the researcher overcome some of the immediate problems of identification of material. It is an annotated bibliography of management, drawing on the wide variety of literature produced by MCB University Press. Over the last four years, MCB University Press has produced an extensive range of books and serial publications covering most of the established and many of the developing areas of management. This volume, in conjunction with Volume I, provides a guide to all the material published so far.
Details
Keywords
The purpose of this paper is to develop a model for online transactions, integrating the social influence approach, the trust‐risk framework, and the theory of reasoned action…
Abstract
Purpose
The purpose of this paper is to develop a model for online transactions, integrating the social influence approach, the trust‐risk framework, and the theory of reasoned action, and to test it in a non US/UK context such as Greece.
Design/methodology/approach
Structural equation modeling was used to survey data from 376 household respondents from two residential departments of the city of Thessaloniki in Greece in order to examine causal inferences.
Findings
The results of the model, where the trust‐risk‐subjective norms framework mediated the impact of information privacy on actual transactions, indicated that the individual's attitude toward using technology, through the intention to submit individual information, resulted in positive actual transaction outcomes.
Research limitations/implications
Cross‐section data were used for testing the model. However, for properly investigating causality time‐series or longitudinal data should be employed.
Practical implications
For increasing online transactions, organizations should make their websites as simple and attractive as possible, develop their image that they do care about customers and are trustworthy, and develop privacy‐friendly policies for gaining competitive advantage.
Originality/value
This study proposes and empirically validates an integrative framework for online transactions at the individual level by adapting information privacy concerns and trust‐risk‐subjective norm beliefs and relates them to attitudes of individuals. Thus, the proposed integrative framework is critically engaging and well established but with limited information models.
Details
Keywords
Alain Y.L. Chong, Felix T.S. Chan, K.B. Ooi and J.J. Sim
The purpose of this paper is to empirically test a framework which identifies the relationships between supply chain management (SCM) practices, operational performance and…
Abstract
Purpose
The purpose of this paper is to empirically test a framework which identifies the relationships between supply chain management (SCM) practices, operational performance and innovation performance of Malaysian manufacturing and service firms.
Design/methodology/approach
Data for the study were collected from a sample of 163 Malaysian manufacturing and service firms. The research model was tested using structural equation modeling.
Findings
The results show that SCM practices in both the upstream and downstream supply chain have a direct and significant impact on organizational and innovation performance of Malaysian firms. Innovation improvement caused by SCM also results in better organizational performance. The findings also reveal that manufacturing and service firms in Malaysia do not have a significant difference in their SCM practices.
Research limitations/implications
The time sequence of the association between the variables could not be concluded given that cross‐sectional data were used. This study also focuse only on Malaysian firms.
Practical implications
This paper shows the importance of SCM practices and how they directly influence organizational and innovation performance. This result will be encouraging to firms in other developing countries. This paper has developed and validated a multi‐dimensional construct of SCM practices, and this tool can assist decision makers of Malaysian firms to evaluate the efficiency of their current SCM practices.
Originality/value
The paper presents one of the few studies which empirically validates the relationships between SCM practices and organizational and innovation performances. The study also focuses on a developing country which is in transition from being manufacturing focused to service focused.
Details
Keywords
This study aims to provide reliable and valid constructs of corporate social responsibility (CSR) and a measurement instrument in the context of Iranian organizations based on the…
Abstract
Purpose
This study aims to provide reliable and valid constructs of corporate social responsibility (CSR) and a measurement instrument in the context of Iranian organizations based on the seven core subjects of International Organization for Standardization (ISO) 26000 standard. It also examines the effects of these seven CSR criteria, namely, organizational governance, human rights, labor practices, the environment, fair operating practices, consumer issues and community involvement, and development on the organizational performance of Iranian organizations.
Design/methodology/approach
Through an extensive study of literature review, the related items of these core subjects were identified. Data for the study were collected from 207 Iranian manufacturing and service firms. The research model was tested using structural equation modeling.
Findings
Statistical analysis revealed that a number of significant relationships between CSR practices and organizational performance of Iranian organizations. The result found that community involvement and development plays an important role in enhancing organizational performance of organizations.
Research limitations/implications
First, the time sequence of the association between the variables could not be concluded, given that cross-sectional data were used. A future study is suggested to conduct a longitudinal research design to present the evidence of causation which cannot be achieved through cross-sectional designs. Second, this study was limited to Iran. Hence, the findings and conclusions drawn from this research are representative of the Iranian context only. Hence, final results should be considered with caution.
Practical implications
This study offers a number of implications for Iranian managers and policy-makers. First, this study identified that there is a relationship between CSR practices based on the seven core subjects of ISO 26000 and firm performance in the context of Iran. Second, the instrument developed, in this research, will be very useful to policy-makers in various industries of Iran as a tool for evaluating the effectiveness of their current CSR practices and initiatives. Third, decision-makers can also prioritize the CSR practices on which their firms should focus to improve their organizational performance.
Originality/value
The novelty of this research is to determine the related items of the core subjects of ISO 26000 as the main factors and offer an instrument to measure the effects of various CSR practices on organizational performance of Iranian firms in the context of Iran.
Details
Keywords
Social relationships on the internet through the emergence of Web 2.0 applications created new opportunities for business. This is mainly because of the growth of social…
Abstract
Purpose
Social relationships on the internet through the emergence of Web 2.0 applications created new opportunities for business. This is mainly because of the growth of social networking sites, which has also developed e‐commerce. The current development in e‐commerce opened a new stream, entitled social commerce, which is using social technologies to create an environment for generating social interactions. These social interactions can drive online social support in e‐commerce, which in turn is creating trust and an increased intention to use social commerce.
Design/methodology/approach
This research used social support theory and related theories on intention to use to propose a theoretical framework for the adoption of social commerce.
Findings
The model predicts that forums and communities, ratings, reviews, referrals and recommendations are helping to introduce new business plans for e‐vendors. The model also shows trust is an on‐going issue in e‐commerce and can be built through social commerce constructs.
Research limitations/implications
There is limited research in the area of social commerce which this study seeks to redress. This study proposes a new model which can be extended by other constructs. However, the research needs to empirically test the constructs of the proposed model and their relationship.
Originality/value
This paper introduces social commerce constructs, namely; recommendations and referrals, forums and communities and rating and reviews. The bases of the model proposed in this research are IT adoption and literature in the area such as PU and intention to buy or trust. These highlight the key role of ICT in the behaviour of online customers. This can be a development for e‐commerce adoption models and the results signify that IS has a reference discipline for the behaviour of online consumers. This is an issue in marketing where not enough attention is paid to the importance of IT and IS.
Details
Keywords
Janice C. Sipior, Burke T. Ward and Regina Connolly
The purpose of this paper is to revisit the internet users’ information privacy concerns (IUIPC) construct, a research model, and hypotheses based on Malhotra et al. (2004) to…
Abstract
Purpose
The purpose of this paper is to revisit the internet users’ information privacy concerns (IUIPC) construct, a research model, and hypotheses based on Malhotra et al. (2004) to assess the continued applicability of this construct. The relationship among privacy concerns, trusting beliefs, and risk beliefs continues to be unclear. Empirical evidence about the impact of privacy concerns on behavior is mixed.
Design/methodology/approach
A paper-based questionnaire was distributed and collected from 63 part-time graduate students of a private university in the mid-Atlantic USA. These respondents have an average of six years of full-time professional work experience and the vast majority (88.9 percent) has over seven years of experience on the internet. Questionnaire items measured the constructs of the IUIPC instrument. All measurement scales were validated using factor analysis, Cronbach's α, and reliability analysis. For hypothesis testing, multiple regression analysis was used.
Findings
The results partially support those of Malhotra et al. (2004). Consistent are the findings that the higher the trust a consumer holds for an online company, the less likely that consumer is to view providing personal information as risky. Also consistent is that the higher the trust a consumer holds for an online company, the more likely is that consumer to intend to provide personal information online. Finally, the greater risk a consumer has for providing personal information, the less willing that consumer is to reveal such information online. However, the results did not support a negative relationship between the IUIPC construct and consumer trust in an online company or a positive relationship between IUIPC and consumer risk in providing personal information to an online company. The paper concludes that the IUIPC is not the valid scale to employ in measuring information privacy concerns.
Research limitations/implications
The main limitation of the findings is the use of a small convenience sample, limiting the insights into interrelationships between various dimensions of privacy concerns and the generalizability of the results.
Practical implications
The results may provide guidance to online retailers in addressing the dimensions of privacy concerns related to trusting beliefs and risk beliefs.
Originality/value
IUIPC were measured using the IUIPC instrument. This responds to Malhotra et al.'s (2004) call to use the IUIPC scale and the associated research framework to further investigate consumer privacy concerns and the suggestion by Belanger and Crossler (2011) that more studies should explore this scale. Further, both Westin (1967), and Smith et al. (1996) recognize that privacy attitudes and concerns may change over time, providing motivation to revisit IUIPC.
Details
Keywords
Angela S.M. Irwin and Adam B. Turner
The purpose of this paper is to highlight the intelligence and investigatory challenges experienced by law enforcement agencies in discovering the identity of illicit Bitcoin…
Abstract
Purpose
The purpose of this paper is to highlight the intelligence and investigatory challenges experienced by law enforcement agencies in discovering the identity of illicit Bitcoin users and the transactions that they perform. This paper proposes solutions to assist law enforcement agencies in piecing together the disparate and complex technical, behavioural and criminological elements that make up cybercriminal offending.
Design/methodology/approach
A literature review was conducted to highlight the main law enforcement challenges and discussions and examine current discourse in the areas of anonymity and attribution. The paper also looked at other research and projects that aim to identify illicit transactions involving cryptocurrencies and the darknet.
Findings
An optimal solution would be one which has a predictive capability and a machine learning architecture which automatically collects and analyses data from the Bitcoin blockchain and other external data sources and applies search criteria matching, indexing and clustering to identify suspicious behaviours. The implementation of a machine learning architecture would help improve results over time and would be less manpower intensive. Cyber investigators would also receive intelligence in a format and language that they understand and it would allow for intelligence-led and predictive policing rather than reactive policing. The optimal solution would be one which allows for intelligence-led, predictive policing and enables and encourages information sharing between multiple stakeholders from the law enforcement, financial intelligence units, cyber security organisations and fintech industry. This would enable the creation of red flags and behaviour models and the provision of up-to-date intelligence on the threat landscape to form a viable intelligence product for law enforcement agencies so that they can more easily get to the who, what, when and where.
Originality/value
The development of a functional software architecture that, in theory, could be used to detected suspicious illicit transactions on the Bitcoin network.
Details
Keywords
Ray Sastri, Fanglin Li, Hafiz Muhammad Naveed and Arbi Setiyawan
The COVID-19 pandemic severely impacted tourism, and the hotel and restaurant industry was the most affected sector, which faced issues related to business uncertainty and…
Abstract
Purpose
The COVID-19 pandemic severely impacted tourism, and the hotel and restaurant industry was the most affected sector, which faced issues related to business uncertainty and unemployment during the crisis. The analysis of recovery time and the influence factors is significant to support policymakers in developing an effective response and mitigating the risks associated with the tourism crisis. This study aims to investigate numerous factors affecting the recovery time of the hotel and restaurant sector after the COVID-19 crisis by using survival analysis.
Design/methodology/approach
This study uses the quarterly value added with the observation time from quarter 1 in 2020 to quarter 1 in 2023 to measure the recovery status. The recovery time refers to the number of quarters needed for the hotel and restaurant sector to get value added equal to or exceed the value added before the crisis. This study applies survival models, including lognormal regression, Weibull regression, and Cox regression, to investigate the effect of numerous factors on the hazard ratio of recovery time of hotels and restaurants after the COVID-19 crisis. This model accommodates all cases, including “recovered” and “not recovered yet” areas.
Findings
The empirical findings represented that the Cox regression model stratified by the area type fit the data well. The priority tourism areas had a longer recovery time than the non-priority areas, but they had a higher probability of recovery from a crisis of the same magnitude. The size of the regional gross domestic product, decentralization funds, multiplier effect, recovery time of transportation, and recovery time of the service sector had a significant impact on the probability of recovery.
Originality/value
This study contributes to the literature by examining the recovery time of the hotel and restaurant sector across Indonesian provinces after the COVID-19 crisis. Employing survival analysis, this study identifies the pivotal factors affecting the probability of recovery. Moreover, this study stands as a pioneer in investigating the multiplier effect of the regional tourism and its impact on the speed of recovery.
Details
Keywords
Himanshu Srivastava and Shashikala Tapaswi
The purpose of this paper is to propose an approach that helps in acquisition of live data as well as data stored in the internal/external memory of android mobile device…
Abstract
Purpose
The purpose of this paper is to propose an approach that helps in acquisition of live data as well as data stored in the internal/external memory of android mobile device considering that the data on the device are not much altered during the extraction process. Also, the emphasis is laid on testing the validity of existing forensic tools against the data obtained manually and by using this approach. Smartphones have spurred the mobile computing technology, and Android is widely used as an Operating System in these devices. These days, users store most of their personal information like emails, images, contacts etc., on Phones/Tablets as their data would be readily accessible and thus convenient for them.
Design/methodology/approach
Android Operating System is built on the Linux Kernel and scripts to extract data from Android Mobile Device with the use of Android Debugging Bridge have been written. The approach is more focused on the logical acquisition of data from devices rather than acquisition using physical methods.
Findings
Live data of the Facebook application running on the device can be extracted. Also, the password of the LuksManager application (used to create an encrypted volume on the device), which is stored in the internal memory, is also extracted and identified.
Research limitations/implications
The study has been conducted in an academic environment, thereby limiting external validity. Another limitation is the limited edition of some of the software forensics tools that are used. The full access to these software tools are restricted by Law enforcement and Investigation policies. The research provides a different approach which could aid in criminal investigation activities on mobile devices.
Practical implications
The devices which have the latest versions of Android not only store messages and mails, but a lot of information about GPS, as well as information about popular applications like Facebook, WhatsApp, etc. This could practically help a lot in criminal investigation.
Originality/value
This study is important because very few works have been done on recent versions (Jellybean and Kitkat) of Android. The proposed approach could extract large amounts of information as compared to earlier approaches with the newer versions of Android having larger memory and new features.