The study provides a comprehensive understanding of the issues and illegal activities related to cryptocurrencies and their negative repercussions. This study aims to identify and…
Abstract
Purpose
The study provides a comprehensive understanding of the issues and illegal activities related to cryptocurrencies and their negative repercussions. This study aims to identify and classify cryptocurrency downsides using grounded theory and in-depth interviews. The study also analysed investors’ reluctance to invest in cryptocurrency. This pioneering qualitative study illuminates a deep and multifaceted criminal aspect of cryptocurrency.
Design/methodology/approach
The study conducted in-depth interviews with respondents who have experience and knowledge of cryptocurrency investments. The interviews were recorded and transcribed. The analysis was performed using the NVivo 14 software in the study.
Findings
The study specified two major types of cryptocurrency’s negative aspects: barriers and illegal usage. Barriers to cryptocurrency investment include technological, security, trust, market-related and regulatory reasons. Terrorist funding, money laundering, fraud and ransom payments are all examples of illegal usage. The results of the word cloud analysis are consistent with the overall findings of the survey, which highlighted illegal usage as a prominent negative element of cryptocurrencies. It is a key reason why cryptocurrency is not included in investing portfolios by investors.
Originality/value
The study’s findings provide useful insights for policymakers to develop better methods for successfully mitigating risks and ensuring responsible and sustainable usage of cryptocurrencies. In addition, the study could serve as a stepping stone for more cryptocurrency-related studies, contributing to the development of a more complete and nuanced comprehension of this emergent technology and its societal effects.
Details
Keywords
Ashish Kumar Sharma, Ankita Goyal and Anjali Sharma
This hypothetical case study aims to revisit the classical model given by Henri Fayol whereby he put forward a set of 14 principles to guide managers in decision-making across…
Abstract
Purpose
This hypothetical case study aims to revisit the classical model given by Henri Fayol whereby he put forward a set of 14 principles to guide managers in decision-making across organizations. The case study showcases the dilemma in which the top manager of an automobile company finds himself when some of the very basic principles – on which the whole discipline of management is founded – are ignored. It will also serve as an aid for faculty members in B-Schools to teach students the significance of basic management principles postulated many years back which stand relevant even in contemporary times.
Design/methodology/approach
This case study is based on a hypothetical scenario in the corporate world. Different incidents in a fictitious automobile manufacturing firm are presented and the corresponding principles given by Henri Fayol are inferred.
Findings
This case study highlights that decision-making gets complicated if fundamental principles of management are not complied with. The decision taken during each and every situation which has been discussed in this case study is contrary to the correct course of action as propounded by Fayol. Modern-day managers must acknowledge the relevance and importance of these principles for achieving success in business.
Originality/value
This case study underscores that even in this volatile business environment where most of the management practices are technology-driven, we cannot disregard the most elementary rules of management. The managers working at different levels in the organizational hierarchy may be guided to make the right decisions in situations similar to the ones described.
Details
Keywords
Durgesh Agnihotri, Pallavi Chaturvedi, Kriti Swarup, Anshul Mathur, Vikas Tripathi and Nripendra Singh
The study investigates the relationship between social presence dimensions and customer brand engagement (CBE) as well as the relation between customer brand engagement and…
Abstract
Purpose
The study investigates the relationship between social presence dimensions and customer brand engagement (CBE) as well as the relation between customer brand engagement and purchase intention (PI) in the fashion retail metaverse with self-efficacy moderating between CBE and PI.
Design/methodology/approach
The data were gathered by conducting an online survey (n = 476) from young adults exposed to fashion retail metaverse platforms. The collected data were analyzed using structural equation modeling.
Findings
The findings discovered that social presence dimensions positively impact CBE, which substantially impacts the PI of young consumers in the fashion retail metaverse. The findings demonstrate that self-efficacy moderates the relationship between CBE and PI.
Research limitations/implications
This study uses cross-sectional data in the fashion retail metaverse for young consumers. Future studies can use longitudinal data in the context of other industries and demographic profiles to assess changing customer behavior.
Practical implications
This study implies that customer experiences can be enriched through social presence dimensions, helping brands adapt their offers to create more engaging and rewarding customer interactions. It offers insights for brand managers aiming to augment the relationship between CBE and PI.
Originality/value
The study uniquely explores the relationship between social presence dimensions and CBE within the fashion retail metaverse. It examines self-efficacy as a moderator between CBE and PI, providing fresh insights into consumer behavior in the fashion retail metaverse.
Details
Keywords
Bhupendra Singh and Neelu Jyoti Ahuja
This paper aims to popularize information retrieval from palm leaf manuscripts among computer scientists to make available the guidance of the age-old heritage in shaping the…
Abstract
Purpose
This paper aims to popularize information retrieval from palm leaf manuscripts among computer scientists to make available the guidance of the age-old heritage in shaping the future.
Design/methodology/approach
With computer technology penetrating every aspect of life, information retrieval algorithms can be exploited to help build a system which can dig into the ocean of knowledge from these manuscripts.
Findings
The knowledge in them covers all aspects of life. Be it religious beliefs, literature, science, mathematics, or any other. However, due to discontinuation of practice of copying their content on fresh leaves, they now possess a fragile life which needs to be preserved at the earliest. The modern means of digitization can help in their preservation.
Research limitations
The Government of India and other organizations are doing commendable job of preserving and safeguarding country’s heritage and age-old knowledge system through the movement of digitization. In the years to come, the agonizing problem of manuscripts degradation will be eradicated completely. However, next when it will come to mining the knowledge treasure out of these manuscripts, we would be confronted with another helpless situation.
Practical implications
The digitization process would capture the manuscripts from present physical palm leaf to digital image form by clicking high-quality pictures. All the text in a palm leaf will be available in the form of images, but on these images, a simple search for any word would not be possible.
Originality/value
Working towards mining the treasure of knowledge from the palm leaf manuscripts, hordes of challenges have been outlined. Over and above the problem of preventing decay to palm leaf manuscripts is the challenge of deciphering text, image analysis, information retrieval and search. Search is further associated with issues of meaningful and useful extraction through semantic analysis. This paper advocates the dire need for systematic research to be undertaken in this field opening up avenues for past knowledge to guide future prospects in several domains.
Details
Keywords
Betul Gokkaya, Erisa Karafili, Leonardo Aniello and Basel Halak
The purpose of this study is to increase awareness of current supply chain (SC) security-related issues by providing an extensive analysis of existing SC security solutions and…
Abstract
Purpose
The purpose of this study is to increase awareness of current supply chain (SC) security-related issues by providing an extensive analysis of existing SC security solutions and their limitations. The security of SCs has received increasing attention from researchers, due to the emerging risks associated with their distributed nature. The increase in risk in SCs comes from threats that are inherently similar regardless of the type of SC, thus, requiring similar defence mechanisms. Being able to identify the types of threats will help developers to build effective defences.
Design/methodology/approach
In this work, we provide an analysis of the threats, possible attacks and traceability solutions for SCs, and highlight outstanding problems. Through a comprehensive literature review (2015–2021), we analysed various SC security solutions, focussing on tracking solutions. In particular, we focus on three types of SCs: digital, food and pharmaceutical that are considered prime targets for cyberattacks. We introduce a systematic categorization of threats and discuss emerging solutions for prevention and mitigation.
Findings
Our study shows that the current traceability solutions for SC systems do not offer a broadened security analysis and fail to provide extensive protection against cyberattacks. Furthermore, global SCs face common challenges, as there are still unresolved issues, especially those related to the increasing SC complexity and interconnectivity, where cyberattacks are spread across suppliers.
Originality/value
This is the first time that a systematic categorization of general threats for SC is made based on an existing threat model for hardware SC.