Nik Thompson, Atif Ahmad and Sean Maynard
It is a widely held belief that users make a rational cost-benefit decision when choosing whether to disclose information online. Yet, in the privacy context, the evidence is far…
Abstract
Purpose
It is a widely held belief that users make a rational cost-benefit decision when choosing whether to disclose information online. Yet, in the privacy context, the evidence is far from conclusive suggesting that strong and as-yet unmeasured influences on behaviour may exist. This paper aims to demonstrate one such link – the effect of internet addiction on information disclosure.
Design/methodology/approach
Data from 216 Web users was collected regarding their perceptions on privacy and information disclosure intentions as well as avoidance behaviour, an element of internet addiction. Using a research model based on the Privacy Calculus theory, structural equation modelling was applied to quantify the determinants of online disclosure under various conditions.
Findings
The authors show that not all aspects of privacy (a multi-dimensional construct) influence information disclosure. While concerns about data collection influence self-disclosure behaviour, the level of awareness about privacy does not. They next examine the impact of internet addiction on these relationships, finding that internet addiction weakens the influence of privacy concerns to the point of non-significance.
Originality/value
The authors highlight some of the influences of self-disclosure behaviour, showing that some but not all aspects of privacy are influential. They also demonstrate that there are powerful influences on user behaviour that have not been accounted for in prior work; internet addiction is one of these factors. This provides some of the first evidence of the potentially deleterious effect of internet addiction on the privacy calculus.
Details
Keywords
The purpose of this paper is to explore how firms can mitigate knowledge hiding behavior among their managers.
Abstract
Purpose
The purpose of this paper is to explore how firms can mitigate knowledge hiding behavior among their managers.
Design/methodology/approach
This study employs a multiple case study methodology for studying nine United Arab Emirates-based (UAE-based) firms. Furthermore, 26 semi-structured interviews with senior managers are undertaken.
Findings
Based on the qualitative interviews and comprehensive data analysis, results unveil three strategies that firms can opt for in order to mitigate knowledge hiding behavior among managers (reducing chain of command, developing informal interaction among managers, introducing and implementing incentive policy.
Research limitations/implications
This study has some limitations. First, the results of this study are not generalizable to a broader population. Second, this study explores behavioral patterns with respect to the UAE culture only.
Practical implications
Firms can use the findings from this study to understand strategies that can help them to mitigate the knowledge hiding behavior of managers.
Originality/value
This study contributes to knowledge hiding literature by revealing strategies which discourages knowledge hiding behavior in firms.
Details
Keywords
The purpose of this paper is to describe the development, design, delivery and evaluation of a postgraduate information security subject that focuses on a managerial, rather than…
Abstract
Purpose
The purpose of this paper is to describe the development, design, delivery and evaluation of a postgraduate information security subject that focuses on a managerial, rather than the more frequently reported technical perspective. The authors aimed to create an atmosphere of intellectual excitement and discovery so that students felt empowered by new ideas, tools and techniques and realized the potential value of what they were learning in the industry.
Design/methodology/approach
The paper develops fundamental principles and arguments that inform the design and development of the teaching curriculum. The curriculum is aimed at security management professionals in general and consultants in particular. The paper explains the teaching method in detail including the specific topics of lectures, representative reading material, assessment tasks and feedback mechanisms. Finally, lessons learned by the authors and their conclusions are presented as a form of reflection.
Findings
The instructors recognized four key factors that played a role in the atmosphere of intellectual excitement and motivation. These were new concepts and ideas, an increased level of engagement, opportunities for students to make their own discoveries and knowledge presented in a practical context. Maintaining a high quality of teaching resources, catering for diverse student needs and incorporating learning cycles of assessment in a short period of time were additional challenges.
Originality/value
Most “information security” curricula described in research literature take a technology-oriented perspective. This paper presents a much-needed management point of view. The teaching curriculum (including assessment tasks) and experiences will be useful to existing and future teaching and research academics in “information security management”. Those interested in developing their own teaching material will benefit from the discussion on potential topic areas, choice of assessment tasks and selection of recommended reading material.
Details
Keywords
Piya Shedden, Rens Scheepers, Wally Smith and Atif Ahmad
Many methodologies exist to assess the security risks associated with unauthorized leakage, modification and interruption of information used by organisations. This paper argues…
Abstract
Purpose
Many methodologies exist to assess the security risks associated with unauthorized leakage, modification and interruption of information used by organisations. This paper argues that these methodologies have a traditional orientation towards the identification and assessment of technical information assets. This obscures key risks associated with the cultivation and deployment of organisational knowledge. The purpose of this paper is to explore how security risk assessment methods can more effectively identify and treat the knowledge associated with business processes.
Design/methodology/approach
The argument was developed through an illustrative case study in which a well‐documented traditional methodology is applied to a complex data backup process. Follow‐up interviews were conducted with the organisation's security managers to explore the results of the assessment and the nature of knowledge “assets” within a business process.
Findings
It was discovered that the backup process depended, in subtle and often informal ways, on tacit knowledge to sustain operational complexity, handle exceptions and make frequent interventions. Although typical information security methodologies identify people as critical assets, this study suggests a new approach might draw on more detailed accounts of individual knowledge, collective knowledge and their relationship to organisational processes.
Originality/value
Drawing on the knowledge management literature, the paper suggests mechanisms to incorporate these knowledge‐based considerations into the scope of information security risk methodologies. A knowledge protection model is presented as a result of this research. This model outlines ways in which organisations can effectively identify and treat risks around process knowledge critical to the business.
Details
Keywords
Muhammad Azeem, Sania Aziz, Jawad Shahid, Aamir Hayat, Munir Ahmed and Muhammad Imran Khan
In a modern business scenario, firms have implemented customer-centric approaches to enable customer relationship management (CRM) to trigger business excellence. Business…
Abstract
Purpose
In a modern business scenario, firms have implemented customer-centric approaches to enable customer relationship management (CRM) to trigger business excellence. Business strategies are modernizing business marketing operations that mainly focused on the retention of profitable customers. The purpose of this study is to empirically investigate the impact of marketing strategies (MS), information technology support (IT-S) and knowledge sharing (KS) in the effect of CRM in the pharmaceutical sector of Punjab, Pakistan.
Design/methodology/approach
Data were collected from the field force of national and international pharmaceuticals companies (N = 263) through a convenience sampling technique. Partial least squares structural equation modeling was used to examine data in SmartPLS 3.2.6.
Findings
The results indicated that IT-S and KS mediate the relationship between MS and CRM. More specifically, MS positively develops CRM through IT-S and KS.
Originality/value
This research contributes to the existing literature of pharmaceuticals by disclosing the field-force (medical representatives) specific role in developing CRM performance between pharmaceuticals firms and health-care physicians that are mainly based on knowledge advancement and influence these firms to adopt customer-centric business approaches to gain a competitive advantage to drive firm profitability.
Details
Keywords
This research paper aims to investigate the impact of pharmaceutical marketing on the prescription behavior of physicians. It further examines whether the use of various…
Abstract
Purpose
This research paper aims to investigate the impact of pharmaceutical marketing on the prescription behavior of physicians. It further examines whether the use of various promotional techniques including advertisements, sales promotions, personal selling and direct marketing by pharmaceutical companies influences the prescription behavior of doctors. Based on the increasing ethical concerns regarding the promotion of specific drugs for personal gains, the research also investigated the moderating role of ethical ideology in the above relationship.
Design/methodology/approach
To accomplish the research goals, quantitative research methods were used. Using the online questionnaire, data were collected from 93 doctors working in government and private hospitals in Pakistan, and structural equation modeling technique was used to analyze the impact of pharmaceutical marketing techniques on the prescription decisions of physicians.
Findings
The findings suggested that marketing strategies of pharmaceutical companies positively influences the prescription behavior of doctors. Further, physicians having weak ethical standards are likely to be strongly influenced by the marketing and promotional practices of companies.
Practical implications
The research is pivotal in understanding the perspective of doctors and the ethical considerations that need to be addressed while devising the marketing campaigns by pharmaceutical companies. Further, these findings provide important implications regarding the essential linkage between ethical values and the development of right marketing tools.
Originality/value
To the best of the authors’ knowledge, this research is one of the first few to empirically develop and test the role of moral values followed by physicians when they take prescription decisions. Based on the findings, future researchers are encouraged to further investigate the need of setting boundaries for pharmaceutical companies and restricting their usage regarding the promotional tactics.
Details
Keywords
Bin Li, Shoukun Wang, Jinge Si, Yongkang Xu, Liang Wang, Chencheng Deng, Junzheng Wang and Zhi Liu
Dynamically tracking the target by unmanned ground vehicles (UGVs) plays a critical role in mobile drone recovery. This study aims to solve this challenge under diverse random…
Abstract
Purpose
Dynamically tracking the target by unmanned ground vehicles (UGVs) plays a critical role in mobile drone recovery. This study aims to solve this challenge under diverse random disturbances, proposing a dynamic target tracking framework for UGVs based on target state estimation, trajectory prediction, and UGV control.
Design/methodology/approach
To mitigate the adverse effects of noise contamination in target detection, the authors use the extended Kalman filter (EKF) to improve the accuracy of locating unmanned aerial vehicles (UAVs). Furthermore, a robust motion prediction algorithm based on polynomial fitting is developed to reduce the impact of trajectory jitter caused by crosswinds, enhancing the stability of drone trajectory prediction. Regarding UGV control, a dynamic vehicle model featuring independent front and rear wheel steering is derived. Additionally, a linear time-varying model predictive control algorithm is proposed to minimize tracking errors for the UGV.
Findings
To validate the feasibility of the framework, the algorithms were deployed on the designed UGV. Experimental results demonstrate the effectiveness of the proposed dynamic tracking algorithm of UGV under random disturbances.
Originality/value
This paper proposes a tracking framework of UGV based on target state estimation, trajectory prediction and UGV predictive control, enabling the system to achieve dynamic tracking to the UAV under multiple disturbance conditions.
Details
Keywords
Saman Yazdannik, Shamim Sanisales and Morteza Tayefi
This paper introduces control strategy to enhance the performance of a novel quadrotor unmanned aerial vehicle designed for medical payload delivery. The aim is to achieve precise…
Abstract
Purpose
This paper introduces control strategy to enhance the performance of a novel quadrotor unmanned aerial vehicle designed for medical payload delivery. The aim is to achieve precise control and stability when carrying and releasing payloads, which alter the quadrotor’s mass and inertia characteristics.
Design/methodology/approach
The equations of motion specific to the payload-carrying quadrotor are derived. A feedforward-proportional-integral-derivative (FF-PID) control strategy is then proposed to address the dynamic changes during payload release. The PID components use propeller speed/orientation information for stability. FF terms based on derivatives of desired position/orientation variables enable adaptation to real-time mass fluctuations.
Findings
Extensive simulations, encompassing various fault scenarios, substantiate the effectiveness of the FF-PID approach. Notably, our findings demonstrate superior performance in maintaining altitude precision and stability during critical phases such as takeoff, payload release and landing. Graphical representations of thrust and mass dynamics distinctly illustrate the payload release event. In contrast to the linear quadratic regulator (LQR) and conventional PID control, which encountered difficulties during the payload release process, our approach proves its robustness and reliability.
Research limitations/implications
This study, primarily based on simulations, demands validation through real-world testing in diverse conditions. Uncertainties in dynamic parameters, external factors and the applicability of the proposed approach to other quadrotor configurations require further investigation. Additionally, this research focuses on controlled payload release, leaving unexplored the challenges posed by unforeseen scenarios or disturbances. Hence, adaptability and fault tolerance necessitate further exploration. While our work presents a promising approach, practical implementation, adaptability and resilience to unexpected events are vital considerations for future research in the field of autonomous aerial medical deliveries.
Practical implications
The proposed control strategy promises enhanced efficiency, reliability and adaptability for autonomous aerial medical deliveries in critical scenarios.
Social implications
The innovative control strategy introduced in this study holds the potential to significantly impact society by enhancing the reliability and adaptability of autonomous aerial medical deliveries. This could lead to faster and more efficient delivery of life-saving supplies to remote or disaster-affected areas, ultimately saving lives and reducing suffering. Moreover, the technology’s adaptability may have broader applications in fields like disaster relief, search and rescue missions, and industrial cargo transport. However, its successful integration into society will require careful regulation, privacy safeguards and ethical considerations to ensure responsible and safe deployment while addressing potential concerns related to noise pollution and privacy intrusion.
Originality/value
While PID control of quadrotors is extensively studied, payload release dynamics have been overlooked. This research studies integration of FF control to enable PID adaptation for a novel payload delivery application.
Details
Keywords
Atif Saleem Butt and Ahmad Bayiz Ahmad
The purpose of this paper is to understand conflicts that emerge between managers of buying and supplying firms when a personal relationship (friendship, etc.) is present between…
Abstract
Purpose
The purpose of this paper is to understand conflicts that emerge between managers of buying and supplying firms when a personal relationship (friendship, etc.) is present between them in the supply chain context.
Design/methodology/approach
This research uses a case study methodology and relies on data obtained from 30 qualitative interviews with managers of buying and supplying firms, having a personal relationship within inter-firm relationships to promote the interest of the firm.
Findings
Results from this study reveal conflicts between managers of buying and supplying firms due to the presence of a personal relationship between them. Specifically, results suggest that managers face ego conflict, supplier’s selection conflict and conflict on accepting late deliveries when they rely on personal relationships, which are themselves embedded within inter-firm relationship.
Research limitations/implications
This study has some limitations. First, this study examines behavioural patterns in Australian cultural context. Second, results of this study are not generalizable to a broader population.
Practical implications
Firms can use the findings to understand conflicts, which arise between managers of buying and supplying firms, as a result of a personal relationship between them in the supply chain.
Originality/value
This is, perhaps, the first study contributing to the supply chain relationship literature by unveiling conflicts between managers of buying and supplying firms, when a personal relationship is present between them.
Details
Keywords
Ahmad Bayiz Ahmad, Bangcheng Liu and Atif Saleem Butt
The purpose of this paper is to develop a standardized, psychometrically sound instrument for the emerging construct of change recipient proactivity (CRP), using a deductive…
Abstract
Purpose
The purpose of this paper is to develop a standardized, psychometrically sound instrument for the emerging construct of change recipient proactivity (CRP), using a deductive approach.
Design/methodology/approach
Using a systematic item-development framework as a guide (i.e. item generation, questionnaire administration, item reduction and scale evaluation) and based on a sample of 414 white-collar employees, this paper discusses the development and validation of an instrument that can be used to measure change recipient’s proactive behavioral responses to planned change efforts.
Findings
Results suggest that our proposed CRP scale is internally consistent (reliable) and valid in that it is conceptually distinct from, yet empirically correlated with neighboring constructs such as affective commitment to change, readiness for change and proactive personality.
Research limitations/implications
The findings illustrate that change recipients can demonstrate proactive behaviors in response to change efforts. However, this study’s contribution is only a first step, requiring further theoretical and methodological refinement of the scale in different contexts.
Originality/value
The deductive nature of our study resulted in a comprehensive and domain-specific scale assessing recipients’ proactive responses to organizational change efforts. This opens doors to empirical studies on examining the conditions under which change recipients “may” step outside the boundaries of passivity to respond positively and proactivity to organizational change efforts.