Search results
1 – 10 of 893Adnan Muhammad Shah, Abdul Qayyum, Mahmood Shah, Raja Ahmed Jamil and KangYoon Lee
This study addresses tourists' post-consumption perspectives on the impact of online destination experiences and animosity on travel decisions. Developing a framework based on the…
Abstract
Purpose
This study addresses tourists' post-consumption perspectives on the impact of online destination experiences and animosity on travel decisions. Developing a framework based on the stimulus-organism-response (SOR) theory, we examine the previously unexplored relationship between post-negative events, online destination brand experience (ODBE), tourists' animosity and destination boycott intentions within the domestic tourism context.
Design/methodology/approach
Data from 355 actively engaged domestic travelers in Pakistan who follow destination social media pages (i.e. Instagram and Facebook) was analyzed using structural equation modeling.
Findings
The findings reveal that post-negative events ODBE significantly stimulate tourists' animosity, which in turn drives destination boycott intentions. The ODBE indirectly affects boycott intentions through animosity, acting as a partial mediator. The analysis highlights the significance of the users' prior experience levels (novice vs experienced). Multigroup analysis shows that novice visitors are more sensitive to negative online experiences, resulting in stronger animosity than experienced visitors. Animosity significantly drives boycott intentions, particularly among experienced visitors.
Originality/value
This study’s novelty lies in its comprehensive examination of post-negative events, focusing on how the ODBE influences tourists' negative emotions and boycott intentions. These findings offer valuable insights for tourism researchers and destination marketers, underscoring the importance of optimizing post-service failure ODBE strategies for brand repair, online reputation management, digital marketing innovation and customized service recovery to mitigate the impact of negative events.
Details
Keywords
Soroush Dehghan Salmasi, Mohammadbashir Sedighi, Hossein Sharif and Mahmood Hussain Shah
Traditionally, the banking and financial sectors have pioneered adoption of new technologies and business models. One important digital banking model that has proven its efficacy…
Abstract
Purpose
Traditionally, the banking and financial sectors have pioneered adoption of new technologies and business models. One important digital banking model that has proven its efficacy in recent times, is Digital-Only Banking (DOB) where consumers interact with their banks through digital channels only. Having detailed knowledge of what actually happens at the consumer level during the adoption of new digital models and technologies is paramount to the success of these technological initiatives. The present study aims to investigate DOB adoption behavior and possible barriers using a quantitative approach at the consumer level. A conceptual model is developed by extending the Unified Theory of Acceptance and Use of Technology (UTAUT) model, incorporating Trust (TR), Perceived Risk (PR) constructs and cultural moderators of Individualism (IDV) and Uncertainty Avoidance (UA).
Design/methodology/approach
For this study, an online survey instrument was created and administered in Iran. The research sample was selected through the application of purposive sampling. Data from 788 respondents were analyzed. The proposed model was tested using Partial Least Square.?.s Structural Equation Modeling (PLS-SEM).
Findings
The results show that DOB adoption is positively influenced by Effort Expectancy (EE), Social Influence (SI), and Facilitating Conditions (FC), while PR negatively influences DOB adoption intention. Unexpectedly, the results indicate that TR has no significant impact on DOB usage intention. Additionally, this study demonstrates that with individuals having a low level of IDV, the relationship between PE and BI is stronger, and with individuals having a low level of UA, the impact of SI on BI is stronger. It also reveals that the impact of TR on BI is stronger in low individualistic cultures.
Practical implications
DOB providers should enhance support features of their services or provide facilities that make it simpler for users to accomplish online transactions. Here, in order to improve the UI/UX design of their apps, DOB product managers should carefully observe the technical guidelines of the operating systems of digital devices, such as the Human Interface Guidelines (HIG) for iOS and Material You for Android. Additionally, DOB providers should build partnerships with mega online retailers to provide hassle-free and easy to use payment solutions for consumers.
Originality/value
DOB, as a novel and business model, has been investigated in very few studies, especially regarding any which focus on its adoption. To fill this gap, this research investigates DOB adoption through a modified version of the UTAUT model. The findings of this study suggest that future research regarding DOB should consider sources of TR, types of non-adopters, and context. This study, as the first of its kind in DOB literature, also highlights the significant role played by cultural values in customer behavior regarding DOB adoption.
Details
Keywords
Atika Ahmad Kemal and Mahmood Hussain Shah
While the potential for digital innovation (DI) to transform organizational practices is widely acknowledged in the information systems (IS) literature, there is very limited…
Abstract
Purpose
While the potential for digital innovation (DI) to transform organizational practices is widely acknowledged in the information systems (IS) literature, there is very limited understanding on the socio-political nature of institutional interactions that determine DI and affect organizational practices in social cash organizations. Drawing on the neo-institutionalist vision, the purpose of the study is to examine the unique set of institutional exchanges that influence the transition to digital social cash payments that give rise to new institutional arrangements in social cash organizations.
Design/methodology/approach
The paper draws on an in-depth case study of a government social cash organization in Pakistan. Qualitative data were collected using 30 semi-structured interviews from key organizational members and stakeholders.
Findings
The results suggest that DI is determined by the novel intersections between the coercive (techno-economic, regulatory), normative (socio-organizational), mimetic (international) and covert power (political) forces. Hence, DI is not a technologically deterministic output, but rather a complex socio-political process enacted through dialogue, negotiation and conflict between institutional actors. Technology is socially embedded through the process of institutionalization that is coupled by the deinstitutionalization of established organizational practices for progressive transformation.
Research limitations/implications
The research has implications for government social cash organizations especially in the Global South. Empirically, the authors gained rare access to, and support from a government-backed social cash organization in Pakistan (an understudied country in the Global South), which made the data and the consequent analyses even invaluable. This made the empirical contribution within this geographical setting even more worthy, since this case study has received little attention from indigenous scholars in the past. The empirical findings showcased a unique set of contextual factors that were subject to BISP and interpreted through an account of socio-cultural sensitivities.
Practical implications
The paper provides practical implications for policymakers and practitioners, emphasizing the need to address institutional challenges, including covert power, during the implementation of digitalization projects in the public sector. The paper has certain potential for inspiring future e-government related (or public sector focused) studies. The paper may guide both private and government policy-makers and practitioners in presenting how to overcome certain institutional challenges while planning and implementing large scale multi-stakeholder digitization projects in similar country contexts. So while there is scope of linking the digitization of public sector organizations to anti-corruption measures in other Global South countries, the paper may not be that straightforward with the private sector involvement.
Social implications
The paper offers rich social insights on the institutional interchanges that occur between the social actors for the innovation of technology. Especially, the paper highlights the social-embeddedness nature of technology that underpins the institutionalization of new organizational practices. These have implications on how DI is viewed as a socio-political process of change.
Originality/value
This study contributes to neo-institutional theory by theorizing covert power as a political force that complements the neo-institutional framework. This force is subtle but also resistive for some political actors as the force shifts the equilibrium of power between different institutional actors. Furthermore, the paper presents the social and practical implications that guide policymakers and practitioners by taking into consideration the unique institutional challenges, such as covert power, while implementing large scale digital projects in the social cash sector.
Details
Keywords
Mahmood Shah, Abdullah Maitlo, Paul Jones and Yahaya Yusuf
Lack of individual awareness of knowledge sharing practices to prevent identity theft is a significant issue for online retail organisations (OROs). Agile learning processes and…
Abstract
Purpose
Lack of individual awareness of knowledge sharing practices to prevent identity theft is a significant issue for online retail organisations (OROs). Agile learning processes and sharing of knowledge is essential, but the lack of relevant training inhibits these processes within the online industry. This study aims to identify the inhibiting factors in agile learning and knowledge sharing process with recommendations for best practice for organisations and staff to effectively share knowledge on identity theft prevention.
Design/methodology/approach
Three qualitative case studies were undertaken in OROs in the UK. Data were collected using semi-structured interviews, internal documents and related external material. The data were analysed using a thematic analysis method.
Findings
The findings identified that individual staff members within OROs from the information security and fraud prevention departments often share their knowledge as a community. However, there is no formal knowledge sharing process or any related training facilitating this exchange. There is a need for agile learning environment in OROs of the UK.
Originality/value
The study offers both theoretical and practical contributions to the extant literature of agile learning of knowledge sharing to prevent identity theft in OROs. Existing learning opportunities are not being used to enhance the knowledge of individuals, and OROs need to increase the skills and trust of their staff to share knowledge efficiently. This study identifies the systemic weaknesses inherent in the process of knowledge sharing and existing training provision within OROs. It provides ORO managers with practical guidelines in facilitating trust between individuals and developing appropriate training systems to educate staff on sharing organisational knowledge. This study contributes by extending the knowledge sharing framework proposed by Chong et al. (2011) for enhanced individual knowledge sharing processes to prevent identity theft within OROs. It also identifies OROs’ weaknesses in knowledge sharing learning processes for theft prevention and offers prevention guidelines and recommendations for developing effective agile learning environments.
Details
Keywords
Basharat Hussain, Abdullah Zafar Sheikh, Julie Repper, Theodore Stickley, Stephen Timmons and Mahmood Hussain Shah
This study aims to investigate how British Pakistani people talk about their social identity, in the context of mental health, and how this shapes their experiences and…
Abstract
Purpose
This study aims to investigate how British Pakistani people talk about their social identity, in the context of mental health, and how this shapes their experiences and perceptions of care delivered by the National Health Service, UK.
Design/methodology/approach
Eight narrative interviews were conducted among members of the Pakistani community living in a city in the UK. The data were analyzed using a narrative analysis approach using “social identity” as a theoretical lens.
Findings
Considering Pakistani service users as a single social entity, and responding with generic approaches in meeting their mental health needs, may not be helpful in achieving equitable treatment. Study participants reject a simple conceptualization of race and ethnicity and how a response based upon stereotypes is woefully inadequate. The study revealed that people from one ethnic or national background cannot be assumed to have a fixed social identity.
Originality/value
This study broadens understanding of how people from a single ethnic background may construct and view their social identities markedly different to others from the same ethnic group. This has implications for service providers in understanding how their clients’ social identity is treated and understood in practice.
Details
Keywords
Zahoor Ahmed Soomro, Javed Ahmed, Mahmood Hussain Shah and Khalil Khoumbati
Identity fraud is a growing issue for online retail organisations. The literature on this issue is scattered, and none of the studies presents a holistic view of identity fraud…
Abstract
Purpose
Identity fraud is a growing issue for online retail organisations. The literature on this issue is scattered, and none of the studies presents a holistic view of identity fraud management practices in the online retail context. Therefore, the purpose of this paper is to investigate the identity fraud management practices and present a comprehensive set of practices for e-tail sector.
Design/methodology/approach
A systematic literature review approach was adopted, and the articles were selected through pre-set inclusion criteria. The authors synthesised existing literature to investigate identity fraud management in e-tail sector.
Findings
The research finds that literature on practices for identity fraud management is scattered. The findings also reveal that firms assume identity fraud issues as a technological challenge, which is one of the major reasons for a gap in effective management of identity frauds. This research suggests e-tailers to deal this issue as a management challenge and counter strategies should be developed in technological, human and organisational aspects.
Research limitations/implications
This study is limited to the published sources of data. Studies, based on empirical data, will be helpful to support the argument of this study; additionally, future studies are recommended to include a wide number of databases.
Practical implications
This research will help e-tail organisations to understand the whole of identity fraud management and help them develop and implement a comprehensive set of practices at each stage, for effective management identity frauds.
Originality/value
This research makes unique contributions by synthesising existing literature at each stage of fraud management and encompasses social, organisational and technological aspects. It will also help academicians understanding a holistic view of available research and opens new lines for future research.
Details
Keywords
Nisreen Ameen, Ali Tarhini, Mahmood Shah and Nnamdi O. Madichie
The transition from multichannel to omnichannel retailing requires a better conceptualisation, especially for customer experience in smart shopping malls. Therefore, this study…
Abstract
Purpose
The transition from multichannel to omnichannel retailing requires a better conceptualisation, especially for customer experience in smart shopping malls. Therefore, this study aims to propose a theoretical model that captures customers’ omnichannel experiences in smart shopping malls in terms of personal interaction, physical environment and virtual environment encounters. It examines the mediating role of flow experience on the relationship between the three types of encounters and customers’ intention to revisit smart shopping malls.
Design/methodology/approach
The study draws on four key theories: the service encounter model, trust-commitment theory, flow theory and experiential value theory. A total of 553 completed questionnaires were collected from customers (millennials) in the United Kingdom (UK). The data was analysed using partial least squares-structural equation modelling.
Findings
The findings show that physical environment encounters and personal interaction encounters play a significant role in customers’ omnichannel experiences in smart malls. Also, of significance are the following aspects of virtual environment encounters: interface design, personalisation, trust, privacy, consumer–peer interaction and relationship commitment. The findings highlight the significant mediating role of flow on the relationships between these three types of encounters and intention, and the effect of flow on omnichannel service usage in smart shopping malls.
Originality/value
The research contributes to the existing literature by proposing a conceptual model: the smart shopping mall omnichannel customer experience (SSMCE) model. The findings offer practical guidance to shopping malls and retailers who wish to enhance the customer omnichannel experience.
Details
Keywords
Chioma Vivian Amasiatu and Mahmood Hussain Shah
First party fraud in which consumers commit fraud against retailers is a growing problem. Research in this area is very limited which means that there is almost no guidance…
Abstract
Purpose
First party fraud in which consumers commit fraud against retailers is a growing problem. Research in this area is very limited which means that there is almost no guidance available to mitigate this problem. Existing fraud management frameworks focus on the management of other fraud, such as identity theft or employee instigated fraud. Due to the different nature of these frauds, these frameworks do not adequately address first party fraud. Therefore, the purpose of this paper is to propose an adapted version of the fraud management lifecycle framework which is specific to first party fraud management.
Design/methodology/approach
The authors conducted a systematic literature review and compared/contrasted a number of existing fraud management frameworks in related domains to see which one would be most suitable for first party fraud management.
Findings
The authors found Wilhelm’s fraud management framework the most promising for adaptation and application to the first party fraud context. By modifying an existing framework according to the contextual requirements, the authors make the framework much more relevant to first party fraud management.
Practical implications
The framework could help retail managers better understand and manage this growing business problem and open new streams for further research.
Originality/value
This research also makes an important contribution by proposing a framework and by helping bridge a glaring and problematic gap in existing literature and opening up new streams of research.
Details
Keywords
Chioma Vivian Amasiatu and Mahmood Hussain Shah
First-party fraud in which retail consumers commit fraud against retailers is a growing problem. However, to date studies on retail crime have focused almost entirely on…
Abstract
Purpose
First-party fraud in which retail consumers commit fraud against retailers is a growing problem. However, to date studies on retail crime have focused almost entirely on fraudulent consumer behaviours in physical stores. With the growth of e-commerce, the losses to retailers from this fraud are growing so there is strong need to research this problem from multiple perspectives. The paper aims to discuss this issue.
Design/methodology/approach
The authors conducted three case studies and a total of 24 semi-structured interviews with retail managers, and evaluated their existing prevention-related documentation. Fraud management lifecycle theory was used to organise and discuss the findings.
Findings
The authors found that many retailers are treating this problem as just a cost of doing business online and have no detailed plans for dealing with this problem or any reporting to law enforcement agencies. However, they have begun working with delivery companies for delivery accuracy. Use of convenience stores as collection points is also showing early improvements.
Research limitations/implications
The small number of cases and interviews used is a limitation of this study. However, the authors believe that the findings are useful for advancing knowledge in this emerging research area.
Practical implications
This study provides insight into existing management practices in this domain, and makes recommendations on how to improve the management of first-party fraud. The study also makes a case for increased managerial interest and involvement in reducing first-party fraud. The study also helps bridge a glaring gap in existing literature and provides useful leads for further research.
Originality/value
To the authors’ knowledge, this is the first study to evaluate the existing practices employed to manage first-party fraud in e-retail.
Details