Search results

1 – 5 of 5
Per page
102050
Citations:
Loading...
Access Restricted. View access options
Article
Publication date: 11 January 2024

Kriti Mehta and Sonia Chawla

The study provides a comprehensive understanding of the issues and illegal activities related to cryptocurrencies and their negative repercussions. This study aims to identify and…

363

Abstract

Purpose

The study provides a comprehensive understanding of the issues and illegal activities related to cryptocurrencies and their negative repercussions. This study aims to identify and classify cryptocurrency downsides using grounded theory and in-depth interviews. The study also analysed investors’ reluctance to invest in cryptocurrency. This pioneering qualitative study illuminates a deep and multifaceted criminal aspect of cryptocurrency.

Design/methodology/approach

The study conducted in-depth interviews with respondents who have experience and knowledge of cryptocurrency investments. The interviews were recorded and transcribed. The analysis was performed using the NVivo 14 software in the study.

Findings

The study specified two major types of cryptocurrency’s negative aspects: barriers and illegal usage. Barriers to cryptocurrency investment include technological, security, trust, market-related and regulatory reasons. Terrorist funding, money laundering, fraud and ransom payments are all examples of illegal usage. The results of the word cloud analysis are consistent with the overall findings of the survey, which highlighted illegal usage as a prominent negative element of cryptocurrencies. It is a key reason why cryptocurrency is not included in investing portfolios by investors.

Originality/value

The study’s findings provide useful insights for policymakers to develop better methods for successfully mitigating risks and ensuring responsible and sustainable usage of cryptocurrencies. In addition, the study could serve as a stepping stone for more cryptocurrency-related studies, contributing to the development of a more complete and nuanced comprehension of this emergent technology and its societal effects.

Details

Digital Policy, Regulation and Governance, vol. 26 no. 2
Type: Research Article
ISSN: 2398-5038

Keywords

Available. Open Access. Open Access
Article
Publication date: 7 May 2024

Ashish Kumar Sharma, Ankita Goyal and Anjali Sharma

This hypothetical case study aims to revisit the classical model given by Henri Fayol whereby he put forward a set of 14 principles to guide managers in decision-making across…

3362

Abstract

Purpose

This hypothetical case study aims to revisit the classical model given by Henri Fayol whereby he put forward a set of 14 principles to guide managers in decision-making across organizations. The case study showcases the dilemma in which the top manager of an automobile company finds himself when some of the very basic principles – on which the whole discipline of management is founded – are ignored. It will also serve as an aid for faculty members in B-Schools to teach students the significance of basic management principles postulated many years back which stand relevant even in contemporary times.

Design/methodology/approach

This case study is based on a hypothetical scenario in the corporate world. Different incidents in a fictitious automobile manufacturing firm are presented and the corresponding principles given by Henri Fayol are inferred.

Findings

This case study highlights that decision-making gets complicated if fundamental principles of management are not complied with. The decision taken during each and every situation which has been discussed in this case study is contrary to the correct course of action as propounded by Fayol. Modern-day managers must acknowledge the relevance and importance of these principles for achieving success in business.

Originality/value

This case study underscores that even in this volatile business environment where most of the management practices are technology-driven, we cannot disregard the most elementary rules of management. The managers working at different levels in the organizational hierarchy may be guided to make the right decisions in situations similar to the ones described.

Details

IIMT Journal of Management, vol. 1 no. 1
Type: Research Article
ISSN: 2976-7261

Keywords

Access Restricted. View access options
Article
Publication date: 25 November 2024

Durgesh Agnihotri, Pallavi Chaturvedi, Kriti Swarup, Anshul Mathur, Vikas Tripathi and Nripendra Singh

The study investigates the relationship between social presence dimensions and customer brand engagement (CBE) as well as the relation between customer brand engagement and…

232

Abstract

Purpose

The study investigates the relationship between social presence dimensions and customer brand engagement (CBE) as well as the relation between customer brand engagement and purchase intention (PI) in the fashion retail metaverse with self-efficacy moderating between CBE and PI.

Design/methodology/approach

The data were gathered by conducting an online survey (n = 476) from young adults exposed to fashion retail metaverse platforms. The collected data were analyzed using structural equation modeling.

Findings

The findings discovered that social presence dimensions positively impact CBE, which substantially impacts the PI of young consumers in the fashion retail metaverse. The findings demonstrate that self-efficacy moderates the relationship between CBE and PI.

Research limitations/implications

This study uses cross-sectional data in the fashion retail metaverse for young consumers. Future studies can use longitudinal data in the context of other industries and demographic profiles to assess changing customer behavior.

Practical implications

This study implies that customer experiences can be enriched through social presence dimensions, helping brands adapt their offers to create more engaging and rewarding customer interactions. It offers insights for brand managers aiming to augment the relationship between CBE and PI.

Originality/value

The study uniquely explores the relationship between social presence dimensions and CBE within the fashion retail metaverse. It examines self-efficacy as a moderator between CBE and PI, providing fresh insights into consumer behavior in the fashion retail metaverse.

Details

Internet Research, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1066-2243

Keywords

Access Restricted. View access options
Article
Publication date: 2 December 2019

Bhupendra Singh and Neelu Jyoti Ahuja

This paper aims to popularize information retrieval from palm leaf manuscripts among computer scientists to make available the guidance of the age-old heritage in shaping the…

687

Abstract

Purpose

This paper aims to popularize information retrieval from palm leaf manuscripts among computer scientists to make available the guidance of the age-old heritage in shaping the future.

Design/methodology/approach

With computer technology penetrating every aspect of life, information retrieval algorithms can be exploited to help build a system which can dig into the ocean of knowledge from these manuscripts.

Findings

The knowledge in them covers all aspects of life. Be it religious beliefs, literature, science, mathematics, or any other. However, due to discontinuation of practice of copying their content on fresh leaves, they now possess a fragile life which needs to be preserved at the earliest. The modern means of digitization can help in their preservation.

Research limitations

The Government of India and other organizations are doing commendable job of preserving and safeguarding country’s heritage and age-old knowledge system through the movement of digitization. In the years to come, the agonizing problem of manuscripts degradation will be eradicated completely. However, next when it will come to mining the knowledge treasure out of these manuscripts, we would be confronted with another helpless situation.

Practical implications

The digitization process would capture the manuscripts from present physical palm leaf to digital image form by clicking high-quality pictures. All the text in a palm leaf will be available in the form of images, but on these images, a simple search for any word would not be possible.

Originality/value

Working towards mining the treasure of knowledge from the palm leaf manuscripts, hordes of challenges have been outlined. Over and above the problem of preventing decay to palm leaf manuscripts is the challenge of deciphering text, image analysis, information retrieval and search. Search is further associated with issues of meaningful and useful extraction through semantic analysis. This paper advocates the dire need for systematic research to be undertaken in this field opening up avenues for past knowledge to guide future prospects in several domains.

Details

Digital Library Perspectives, vol. 35 no. 3/4
Type: Research Article
ISSN: 2059-5816

Keywords

Access Restricted. View access options
Article
Publication date: 4 March 2024

Betul Gokkaya, Erisa Karafili, Leonardo Aniello and Basel Halak

The purpose of this study is to increase awareness of current supply chain (SC) security-related issues by providing an extensive analysis of existing SC security solutions and…

283

Abstract

Purpose

The purpose of this study is to increase awareness of current supply chain (SC) security-related issues by providing an extensive analysis of existing SC security solutions and their limitations. The security of SCs has received increasing attention from researchers, due to the emerging risks associated with their distributed nature. The increase in risk in SCs comes from threats that are inherently similar regardless of the type of SC, thus, requiring similar defence mechanisms. Being able to identify the types of threats will help developers to build effective defences.

Design/methodology/approach

In this work, we provide an analysis of the threats, possible attacks and traceability solutions for SCs, and highlight outstanding problems. Through a comprehensive literature review (2015–2021), we analysed various SC security solutions, focussing on tracking solutions. In particular, we focus on three types of SCs: digital, food and pharmaceutical that are considered prime targets for cyberattacks. We introduce a systematic categorization of threats and discuss emerging solutions for prevention and mitigation.

Findings

Our study shows that the current traceability solutions for SC systems do not offer a broadened security analysis and fail to provide extensive protection against cyberattacks. Furthermore, global SCs face common challenges, as there are still unresolved issues, especially those related to the increasing SC complexity and interconnectivity, where cyberattacks are spread across suppliers.

Originality/value

This is the first time that a systematic categorization of general threats for SC is made based on an existing threat model for hardware SC.

Details

Benchmarking: An International Journal, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1463-5771

Keywords

1 – 5 of 5
Per page
102050