Search results

1 – 10 of 175
Per page
102050
Citations:
Loading...
Access Restricted. View access options
Article
Publication date: 5 April 2021

Nik Thompson, Atif Ahmad and Sean Maynard

It is a widely held belief that users make a rational cost-benefit decision when choosing whether to disclose information online. Yet, in the privacy context, the evidence is far…

436

Abstract

Purpose

It is a widely held belief that users make a rational cost-benefit decision when choosing whether to disclose information online. Yet, in the privacy context, the evidence is far from conclusive suggesting that strong and as-yet unmeasured influences on behaviour may exist. This paper aims to demonstrate one such link – the effect of internet addiction on information disclosure.

Design/methodology/approach

Data from 216 Web users was collected regarding their perceptions on privacy and information disclosure intentions as well as avoidance behaviour, an element of internet addiction. Using a research model based on the Privacy Calculus theory, structural equation modelling was applied to quantify the determinants of online disclosure under various conditions.

Findings

The authors show that not all aspects of privacy (a multi-dimensional construct) influence information disclosure. While concerns about data collection influence self-disclosure behaviour, the level of awareness about privacy does not. They next examine the impact of internet addiction on these relationships, finding that internet addiction weakens the influence of privacy concerns to the point of non-significance.

Originality/value

The authors highlight some of the influences of self-disclosure behaviour, showing that some but not all aspects of privacy are influential. They also demonstrate that there are powerful influences on user behaviour that have not been accounted for in prior work; internet addiction is one of these factors. This provides some of the first evidence of the potentially deleterious effect of internet addiction on the privacy calculus.

Details

Information & Computer Security, vol. 29 no. 3
Type: Research Article
ISSN: 2056-4961

Keywords

Access Restricted. View access options
Article
Publication date: 27 May 2020

Atif Saleem Butt

The purpose of this paper is to explore how firms can mitigate knowledge hiding behavior among their managers.

622

Abstract

Purpose

The purpose of this paper is to explore how firms can mitigate knowledge hiding behavior among their managers.

Design/methodology/approach

This study employs a multiple case study methodology for studying nine United Arab Emirates-based (UAE-based) firms. Furthermore, 26 semi-structured interviews with senior managers are undertaken.

Findings

Based on the qualitative interviews and comprehensive data analysis, results unveil three strategies that firms can opt for in order to mitigate knowledge hiding behavior among managers (reducing chain of command, developing informal interaction among managers, introducing and implementing incentive policy.

Research limitations/implications

This study has some limitations. First, the results of this study are not generalizable to a broader population. Second, this study explores behavioral patterns with respect to the UAE culture only.

Practical implications

Firms can use the findings from this study to understand strategies that can help them to mitigate the knowledge hiding behavior of managers.

Originality/value

This study contributes to knowledge hiding literature by revealing strategies which discourages knowledge hiding behavior in firms.

Details

Baltic Journal of Management, vol. 15 no. 4
Type: Research Article
ISSN: 1746-5265

Keywords

Access Restricted. View access options
Article
Publication date: 10 November 2014

Atif Ahmad and Sean Maynard

The purpose of this paper is to describe the development, design, delivery and evaluation of a postgraduate information security subject that focuses on a managerial, rather than…

2529

Abstract

Purpose

The purpose of this paper is to describe the development, design, delivery and evaluation of a postgraduate information security subject that focuses on a managerial, rather than the more frequently reported technical perspective. The authors aimed to create an atmosphere of intellectual excitement and discovery so that students felt empowered by new ideas, tools and techniques and realized the potential value of what they were learning in the industry.

Design/methodology/approach

The paper develops fundamental principles and arguments that inform the design and development of the teaching curriculum. The curriculum is aimed at security management professionals in general and consultants in particular. The paper explains the teaching method in detail including the specific topics of lectures, representative reading material, assessment tasks and feedback mechanisms. Finally, lessons learned by the authors and their conclusions are presented as a form of reflection.

Findings

The instructors recognized four key factors that played a role in the atmosphere of intellectual excitement and motivation. These were new concepts and ideas, an increased level of engagement, opportunities for students to make their own discoveries and knowledge presented in a practical context. Maintaining a high quality of teaching resources, catering for diverse student needs and incorporating learning cycles of assessment in a short period of time were additional challenges.

Originality/value

Most “information security” curricula described in research literature take a technology-oriented perspective. This paper presents a much-needed management point of view. The teaching curriculum (including assessment tasks) and experiences will be useful to existing and future teaching and research academics in “information security management”. Those interested in developing their own teaching material will benefit from the discussion on potential topic areas, choice of assessment tasks and selection of recommended reading material.

Details

Information Management & Computer Security, vol. 22 no. 5
Type: Research Article
ISSN: 0968-5227

Keywords

Access Restricted. View access options
Article
Publication date: 17 May 2011

Piya Shedden, Rens Scheepers, Wally Smith and Atif Ahmad

Many methodologies exist to assess the security risks associated with unauthorized leakage, modification and interruption of information used by organisations. This paper argues

2268

Abstract

Purpose

Many methodologies exist to assess the security risks associated with unauthorized leakage, modification and interruption of information used by organisations. This paper argues that these methodologies have a traditional orientation towards the identification and assessment of technical information assets. This obscures key risks associated with the cultivation and deployment of organisational knowledge. The purpose of this paper is to explore how security risk assessment methods can more effectively identify and treat the knowledge associated with business processes.

Design/methodology/approach

The argument was developed through an illustrative case study in which a well‐documented traditional methodology is applied to a complex data backup process. Follow‐up interviews were conducted with the organisation's security managers to explore the results of the assessment and the nature of knowledge “assets” within a business process.

Findings

It was discovered that the backup process depended, in subtle and often informal ways, on tacit knowledge to sustain operational complexity, handle exceptions and make frequent interventions. Although typical information security methodologies identify people as critical assets, this study suggests a new approach might draw on more detailed accounts of individual knowledge, collective knowledge and their relationship to organisational processes.

Originality/value

Drawing on the knowledge management literature, the paper suggests mechanisms to incorporate these knowledge‐based considerations into the scope of information security risk methodologies. A knowledge protection model is presented as a result of this research. This model outlines ways in which organisations can effectively identify and treat risks around process knowledge critical to the business.

Details

VINE, vol. 41 no. 2
Type: Research Article
ISSN: 0305-5728

Keywords

Access Restricted. View access options
Article
Publication date: 14 December 2021

Muhammad Azeem, Sania Aziz, Jawad Shahid, Aamir Hayat, Munir Ahmed and Muhammad Imran Khan

In a modern business scenario, firms have implemented customer-centric approaches to enable customer relationship management (CRM) to trigger business excellence. Business…

1285

Abstract

Purpose

In a modern business scenario, firms have implemented customer-centric approaches to enable customer relationship management (CRM) to trigger business excellence. Business strategies are modernizing business marketing operations that mainly focused on the retention of profitable customers. The purpose of this study is to empirically investigate the impact of marketing strategies (MS), information technology support (IT-S) and knowledge sharing (KS) in the effect of CRM in the pharmaceutical sector of Punjab, Pakistan.

Design/methodology/approach

Data were collected from the field force of national and international pharmaceuticals companies (N = 263) through a convenience sampling technique. Partial least squares structural equation modeling was used to examine data in SmartPLS 3.2.6.

Findings

The results indicated that IT-S and KS mediate the relationship between MS and CRM. More specifically, MS positively develops CRM through IT-S and KS.

Originality/value

This research contributes to the existing literature of pharmaceuticals by disclosing the field-force (medical representatives) specific role in developing CRM performance between pharmaceuticals firms and health-care physicians that are mainly based on knowledge advancement and influence these firms to adopt customer-centric business approaches to gain a competitive advantage to drive firm profitability.

Details

International Journal of Pharmaceutical and Healthcare Marketing, vol. 16 no. 1
Type: Research Article
ISSN: 1750-6123

Keywords

Access Restricted. View access options
Article
Publication date: 19 January 2023

Tanzeela Aqif and Sana Mumtaz

This research paper aims to investigate the impact of pharmaceutical marketing on the prescription behavior of physicians. It further examines whether the use of various…

368

Abstract

Purpose

This research paper aims to investigate the impact of pharmaceutical marketing on the prescription behavior of physicians. It further examines whether the use of various promotional techniques including advertisements, sales promotions, personal selling and direct marketing by pharmaceutical companies influences the prescription behavior of doctors. Based on the increasing ethical concerns regarding the promotion of specific drugs for personal gains, the research also investigated the moderating role of ethical ideology in the above relationship.

Design/methodology/approach

To accomplish the research goals, quantitative research methods were used. Using the online questionnaire, data were collected from 93 doctors working in government and private hospitals in Pakistan, and structural equation modeling technique was used to analyze the impact of pharmaceutical marketing techniques on the prescription decisions of physicians.

Findings

The findings suggested that marketing strategies of pharmaceutical companies positively influences the prescription behavior of doctors. Further, physicians having weak ethical standards are likely to be strongly influenced by the marketing and promotional practices of companies.

Practical implications

The research is pivotal in understanding the perspective of doctors and the ethical considerations that need to be addressed while devising the marketing campaigns by pharmaceutical companies. Further, these findings provide important implications regarding the essential linkage between ethical values and the development of right marketing tools.

Originality/value

To the best of the authors’ knowledge, this research is one of the first few to empirically develop and test the role of moral values followed by physicians when they take prescription decisions. Based on the findings, future researchers are encouraged to further investigate the need of setting boundaries for pharmaceutical companies and restricting their usage regarding the promotional tactics.

Details

International Journal of Pharmaceutical and Healthcare Marketing, vol. 17 no. 1
Type: Research Article
ISSN: 1750-6123

Keywords

Access Restricted. View access options
Article
Publication date: 19 July 2024

Bin Li, Shoukun Wang, Jinge Si, Yongkang Xu, Liang Wang, Chencheng Deng, Junzheng Wang and Zhi Liu

Dynamically tracking the target by unmanned ground vehicles (UGVs) plays a critical role in mobile drone recovery. This study aims to solve this challenge under diverse random…

97

Abstract

Purpose

Dynamically tracking the target by unmanned ground vehicles (UGVs) plays a critical role in mobile drone recovery. This study aims to solve this challenge under diverse random disturbances, proposing a dynamic target tracking framework for UGVs based on target state estimation, trajectory prediction, and UGV control.

Design/methodology/approach

To mitigate the adverse effects of noise contamination in target detection, the authors use the extended Kalman filter (EKF) to improve the accuracy of locating unmanned aerial vehicles (UAVs). Furthermore, a robust motion prediction algorithm based on polynomial fitting is developed to reduce the impact of trajectory jitter caused by crosswinds, enhancing the stability of drone trajectory prediction. Regarding UGV control, a dynamic vehicle model featuring independent front and rear wheel steering is derived. Additionally, a linear time-varying model predictive control algorithm is proposed to minimize tracking errors for the UGV.

Findings

To validate the feasibility of the framework, the algorithms were deployed on the designed UGV. Experimental results demonstrate the effectiveness of the proposed dynamic tracking algorithm of UGV under random disturbances.

Originality/value

This paper proposes a tracking framework of UGV based on target state estimation, trajectory prediction and UGV predictive control, enabling the system to achieve dynamic tracking to the UAV under multiple disturbance conditions.

Details

Industrial Robot: the international journal of robotics research and application, vol. 51 no. 5
Type: Research Article
ISSN: 0143-991X

Keywords

Access Restricted. View access options
Article
Publication date: 14 May 2024

Saman Yazdannik, Shamim Sanisales and Morteza Tayefi

This paper introduces control strategy to enhance the performance of a novel quadrotor unmanned aerial vehicle designed for medical payload delivery. The aim is to achieve precise…

104

Abstract

Purpose

This paper introduces control strategy to enhance the performance of a novel quadrotor unmanned aerial vehicle designed for medical payload delivery. The aim is to achieve precise control and stability when carrying and releasing payloads, which alter the quadrotor’s mass and inertia characteristics.

Design/methodology/approach

The equations of motion specific to the payload-carrying quadrotor are derived. A feedforward-proportional-integral-derivative (FF-PID) control strategy is then proposed to address the dynamic changes during payload release. The PID components use propeller speed/orientation information for stability. FF terms based on derivatives of desired position/orientation variables enable adaptation to real-time mass fluctuations.

Findings

Extensive simulations, encompassing various fault scenarios, substantiate the effectiveness of the FF-PID approach. Notably, our findings demonstrate superior performance in maintaining altitude precision and stability during critical phases such as takeoff, payload release and landing. Graphical representations of thrust and mass dynamics distinctly illustrate the payload release event. In contrast to the linear quadratic regulator (LQR) and conventional PID control, which encountered difficulties during the payload release process, our approach proves its robustness and reliability.

Research limitations/implications

This study, primarily based on simulations, demands validation through real-world testing in diverse conditions. Uncertainties in dynamic parameters, external factors and the applicability of the proposed approach to other quadrotor configurations require further investigation. Additionally, this research focuses on controlled payload release, leaving unexplored the challenges posed by unforeseen scenarios or disturbances. Hence, adaptability and fault tolerance necessitate further exploration. While our work presents a promising approach, practical implementation, adaptability and resilience to unexpected events are vital considerations for future research in the field of autonomous aerial medical deliveries.

Practical implications

The proposed control strategy promises enhanced efficiency, reliability and adaptability for autonomous aerial medical deliveries in critical scenarios.

Social implications

The innovative control strategy introduced in this study holds the potential to significantly impact society by enhancing the reliability and adaptability of autonomous aerial medical deliveries. This could lead to faster and more efficient delivery of life-saving supplies to remote or disaster-affected areas, ultimately saving lives and reducing suffering. Moreover, the technology’s adaptability may have broader applications in fields like disaster relief, search and rescue missions, and industrial cargo transport. However, its successful integration into society will require careful regulation, privacy safeguards and ethical considerations to ensure responsible and safe deployment while addressing potential concerns related to noise pollution and privacy intrusion.

Originality/value

While PID control of quadrotors is extensively studied, payload release dynamics have been overlooked. This research studies integration of FF control to enable PID adaptation for a novel payload delivery application.

Details

International Journal of Intelligent Unmanned Systems, vol. 12 no. 3
Type: Research Article
ISSN: 2049-6427

Keywords

Access Restricted. View access options
Article
Publication date: 10 June 2019

Atif Saleem Butt and Ahmad Bayiz Ahmad

The purpose of this paper is to understand conflicts that emerge between managers of buying and supplying firms when a personal relationship (friendship, etc.) is present between…

568

Abstract

Purpose

The purpose of this paper is to understand conflicts that emerge between managers of buying and supplying firms when a personal relationship (friendship, etc.) is present between them in the supply chain context.

Design/methodology/approach

This research uses a case study methodology and relies on data obtained from 30 qualitative interviews with managers of buying and supplying firms, having a personal relationship within inter-firm relationships to promote the interest of the firm.

Findings

Results from this study reveal conflicts between managers of buying and supplying firms due to the presence of a personal relationship between them. Specifically, results suggest that managers face ego conflict, supplier’s selection conflict and conflict on accepting late deliveries when they rely on personal relationships, which are themselves embedded within inter-firm relationship.

Research limitations/implications

This study has some limitations. First, this study examines behavioural patterns in Australian cultural context. Second, results of this study are not generalizable to a broader population.

Practical implications

Firms can use the findings to understand conflicts, which arise between managers of buying and supplying firms, as a result of a personal relationship between them in the supply chain.

Originality/value

This is, perhaps, the first study contributing to the supply chain relationship literature by unveiling conflicts between managers of buying and supplying firms, when a personal relationship is present between them.

Details

Benchmarking: An International Journal, vol. 26 no. 7
Type: Research Article
ISSN: 1463-5771

Keywords

Access Restricted. View access options
Article
Publication date: 2 January 2020

Ahmad Bayiz Ahmad, Bangcheng Liu and Atif Saleem Butt

The purpose of this paper is to develop a standardized, psychometrically sound instrument for the emerging construct of change recipient proactivity (CRP), using a deductive…

931

Abstract

Purpose

The purpose of this paper is to develop a standardized, psychometrically sound instrument for the emerging construct of change recipient proactivity (CRP), using a deductive approach.

Design/methodology/approach

Using a systematic item-development framework as a guide (i.e. item generation, questionnaire administration, item reduction and scale evaluation) and based on a sample of 414 white-collar employees, this paper discusses the development and validation of an instrument that can be used to measure change recipient’s proactive behavioral responses to planned change efforts.

Findings

Results suggest that our proposed CRP scale is internally consistent (reliable) and valid in that it is conceptually distinct from, yet empirically correlated with neighboring constructs such as affective commitment to change, readiness for change and proactive personality.

Research limitations/implications

The findings illustrate that change recipients can demonstrate proactive behaviors in response to change efforts. However, this study’s contribution is only a first step, requiring further theoretical and methodological refinement of the scale in different contexts.

Originality/value

The deductive nature of our study resulted in a comprehensive and domain-specific scale assessing recipients’ proactive responses to organizational change efforts. This opens doors to empirical studies on examining the conditions under which change recipients “may” step outside the boundaries of passivity to respond positively and proactivity to organizational change efforts.

1 – 10 of 175
Per page
102050