Template-Type: ReDIF-Article 1.0
Author-Name: Christine T. Berry
Author-X-Name-First: Christine T.
Author-X-Name-Last: Berry
Author-Name: Ronald L. Berry
Author-X-Name-First: Ronald L.
Author-X-Name-Last: Berry
Title: An initial assessment of small business risk management approaches for cyber security threats
Abstract:
While larger companies have resources to address cyber security issues, small companies often do not. Usually, a business owner or his immediate family members handle many different roles within the small business. Because of a lack of information technology knowledge and resources to hire that knowledge, many small businesses are at a great risk of having their systems compromised. The purpose of this paper is to report the findings of a field study that included over 370 interviews with small business owners about their approach to risk management, including those related to cyber security threats. Results indicate that small business owners are often likely to have the basic tools related to technology risk management in place, but lack the policies, procedures and training to secure their information resources. Additionally, responses indicated a majority of respondents do not use strong passwords to protect their information assets.
Journal: Int. J. of Business Continuity and Risk Management
Pages: 1-10
Issue: 1
Volume: 8
Year: 2018
Keywords: small business risk management; cyber security; internet security; cyber crime.
File-URL: http://www.inderscience.com/link.php?id=90580
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:ids:ijbcrm:v:8:y:2018:i:1:p:1-10
Template-Type: ReDIF-Article 1.0
Author-Name: Nijaz Bajgoric
Author-X-Name-First: Nijaz
Author-X-Name-Last: Bajgoric
Title: Reengineering business information systems to support business continuity
Abstract:
The paper aims at presenting an implementation framework for reengineering traditional business information systems (ISs) into ISs that support business continuity (BC) or 'always-on' ISs. The framework has been developed by using a methodology framework based on a literature review and Churchman's (1971) systemic model, particularly his definition of 'system designer'. Four reengineering drivers are identified: downtime costs, IT-oriented business models, business continuity and IS-systemic perspective. Technology enablers for implementation of such systems are presented as well. Presented framework brings some additional dimensions with regard to modern ISs particularly those related to human aspects (Churchman's client, designer and decision maker). It explores critical aspects of modern ISs such as high availability (HA) ratios, continuous data access, always-on computing, continuous computing technologies, as well as managerial aspects with regard to the roles of CIOs, system admins and business continuity managers. As such, the presented framework can be used in the projects of transforming traditional business ISs into always-on ISs.
Journal: Int. J. of Business Continuity and Risk Management
Pages: 11-35
Issue: 1
Volume: 8
Year: 2018
Keywords: systems approach; information system; business continuity; always-on business; always-on information systems.
File-URL: http://www.inderscience.com/link.php?id=90581
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:ids:ijbcrm:v:8:y:2018:i:1:p:11-35
Template-Type: ReDIF-Article 1.0
Author-Name: Petter Gottschalk
Author-X-Name-First: Petter
Author-X-Name-Last: Gottschalk
Title: Evaluation of fraud examinations: a principal-agent study of private internal investigations
Abstract:
Agency theory suggests that problems in terms of conflicting preferences, knowledge asymmetry and different attitudes towards risks can have a negative impact on work outcome from the agent to the principal. In private internal investigations, the client is the principal, while the fraud examiner is the agent. Based on a sample of 49 reports of investigation from Norway, this article presents empirical results testing agency theory. Results indicate that agency issues do have a significant influence on the contribution from internal investigations, but the influence is not necessarily negative. While different attitudes towards risk have a negative impact, knowledge asymmetry has a positive impact on the contribution from an investigation. A possible explanation for this surprising result is that examiners are experts in other areas than the client, which is the reason why examiners are hired by clients.
Journal: Int. J. of Business Continuity and Risk Management
Pages: 36-48
Issue: 1
Volume: 8
Year: 2018
Keywords: agency theory; fraud examination; internal investigations; conflicting preferences.
File-URL: http://www.inderscience.com/link.php?id=90592
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:ids:ijbcrm:v:8:y:2018:i:1:p:36-48
Template-Type: ReDIF-Article 1.0
Author-Name: Chung-Kuang Hou
Author-X-Name-First: Chung-Kuang
Author-X-Name-Last: Hou
Title: Examining users' intention to continue using business intelligence systems from the perspectives of end-user computing satisfaction and individual performance
Abstract:
End-user computing satisfaction (EUCS) and individual performance have been recognised by many researchers as critical determinants influencing users' intention to use information systems. Even though a great deal of attention has been paid to the practical decision-making benefits of BI system adoption, there is still a lack of research to explore the nature of EUCS with BI systems and to investigate factors that affect users' intention to continue using BI systems after adopting the systems. Therefore, the purpose of this study is to empirically investigate the relationships between EUCS, continuance intention, and individual performance with BI systems. The empirical data collected from 330 users in the Taiwanese electronics industry showed that higher levels of EUCS can lead to increased BI continuance intention and improved individual performance and that higher levels of individual performance will lead to higher levels of BI continuance intention.
Journal: Int. J. of Business Continuity and Risk Management
Pages: 49-70
Issue: 1
Volume: 8
Year: 2018
Keywords: user satisfaction; business intelligence; continuance intention; individual performance; structural equation models.
File-URL: http://www.inderscience.com/link.php?id=90593
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:ids:ijbcrm:v:8:y:2018:i:1:p:49-70
Template-Type: ReDIF-Article 1.0
Author-Name: Betul Sekendiz
Author-X-Name-First: Betul
Author-X-Name-Last: Sekendiz
Author-Name: Kevin Norton
Author-X-Name-First: Kevin
Author-X-Name-Last: Norton
Author-Name: Patrick Keyzer
Author-X-Name-First: Patrick
Author-X-Name-Last: Keyzer
Author-Name: Joachim Dietrich
Author-X-Name-First: Joachim
Author-X-Name-Last: Dietrich
Author-Name: Ian R. Coyle
Author-X-Name-First: Ian R.
Author-X-Name-Last: Coyle
Author-Name: Shannon Gray
Author-X-Name-First: Shannon
Author-X-Name-Last: Gray
Author-Name: Caroline F. Finch
Author-X-Name-First: Caroline F.
Author-X-Name-Last: Finch
Title: Emergency preparedness in fitness facilities: bridging the gap between policy and practice
Abstract:
Fitness facilities are an important contributor to economies through preventative health policies of governments. Therefore, it is crucial that they are capable of ensuring the health and safety of their users during emergency situations under relevant work health and safety (WHS) legislation. This study aimed to analyse emergency response preparedness in fitness facilities in Australia and develop evidence-based strategic recommendations, using a mixed methods approach. An onsite observational audit tool and in-depth interviews were conducted at a sample of regional and metropolitan fitness facilities. The results showed that fitness facilities showed a lack of operational emergency response practices that requires an integrated approach to risk management by fitness facility operators. This gap between policy and practice has significant implications for all stakeholders involved in fitness service provision, including government agencies, academia and industry governing organisations.
Journal: Int. J. of Business Continuity and Risk Management
Pages: 71-85
Issue: 1
Volume: 8
Year: 2018
Keywords: fitness facilities; risk management; safety; emergency preparedness; emergency response; policy development; observational audit; fitness industry.
File-URL: http://www.inderscience.com/link.php?id=90595
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:ids:ijbcrm:v:8:y:2018:i:1:p:71-85
Template-Type: ReDIF-Article 1.0
Author-Name: Ahmad Yousef Areiqat
Author-X-Name-First: Ahmad Yousef
Author-X-Name-Last: Areiqat
Author-Name: Asaad Alali
Author-X-Name-First: Asaad
Author-X-Name-Last: Alali
Author-Name: Yousef Arikat
Author-X-Name-First: Yousef
Author-X-Name-Last: Arikat
Title: Risk management to avoid project failure: a comparison study of construction projects in the GCC
Abstract:
This study aims to identify the basic failure and success factors of construction projects in the six Gulf Cooperation Council (GCC) countries using secondary and qualitative data, articles, journals and case studies to draw some conclusions. The study found that falling oil prices have a significant impact on projects because they affect their financial support and that poor risk management caused delays and cost overruns. Additionally, the lack of a well-established plan or good planning before commencing the project leads to delays and ultimately project failure. Recommendations and conclusions, such as increasing and improving the risk management training necessary to predict and avoid the deeper risks in different projects, are based on the analysis and the understanding of the literature review and case studies. Setting up alternative back-up plans in the event the project fails and PESTEL risk analysis, which focuses on multidimensional factors, should be used.
Journal: Int. J. of Business Continuity and Risk Management
Pages: 87-105
Issue: 2
Volume: 8
Year: 2018
Keywords: risk management; construction projects; Gulf Cooperation Council; GCC.
File-URL: http://www.inderscience.com/link.php?id=92910
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:ids:ijbcrm:v:8:y:2018:i:2:p:87-105
Template-Type: ReDIF-Article 1.0
Author-Name: Sachin Saini
Author-X-Name-First: Sachin
Author-X-Name-Last: Saini
Author-Name: Doordarshi Singh
Author-X-Name-First: Doordarshi
Author-X-Name-Last: Singh
Title: Lean practices for consummating competitive priorities in SMEs: a critical review
Abstract:
Fierce competition in the present business world has necessitated the adoption of lean practices for survival in business. To retain their market share, small and medium enterprises have to eradicate waste to attain competitive priorities. A detailed review of 103 lean stories has revealed diverse practices based on region, size and type of the sector. The focus here is on identifying the best lean practices. The study, split into five parts: 1) lean tenets; 2) lean manufacturing practices in SMEs; 3) comparison table of lean practices; 4) classification of lean practices in model form; 5) barriers to lean practices, will help to identify the best lean practices to achieve competitive priorities especially in developing countries. In case of barricades, the management has a pivotal role to play in transforming the organisation to lean practices which make it viable to attain competitive priorities such as productivity, cost, quality, delivery, safety, morale and financial performance.
Journal: Int. J. of Business Continuity and Risk Management
Pages: 106-123
Issue: 2
Volume: 8
Year: 2018
Keywords: lean manufacturing; LM; lean production; literature review; lean practices; small and medium enterprises; SMEs.
File-URL: http://www.inderscience.com/link.php?id=92916
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:ids:ijbcrm:v:8:y:2018:i:2:p:106-123
Template-Type: ReDIF-Article 1.0
Author-Name: Maryam Ebrahimi
Author-X-Name-First: Maryam
Author-X-Name-Last: Ebrahimi
Title: Development of renewable energy technology strategies using hybrid fuzzy MADM in SMEs
Abstract:
In this study, fuzzy analytic network process (FANP) method is used in combination with fuzzy decision-making trial and evaluation laboratory (FDEMATEL), within the framework of SWOT analysis, to propose technology strategies (TSs) in renewable energy small and medium enterprises (SMEs). Both methods are applied to real life cases including decision data of human judgments with vague preferences. The used data is gathered from twelve experts working in SMEs within Iran's renewable energy sector; they are selected via a non-random sampling method. DEMATEL is a powerful method to capture the causal relationship between criteria and ANP with the help of DEMATEL looks for possible interdependencies among the elements, so as to evaluate different strategies and have the optimum one selected. SWOT analysis model is essentially related to the evaluation of the company's internal and external environments. The results of the present research were employed to present and prioritise different TSs.
Journal: Int. J. of Business Continuity and Risk Management
Pages: 158-181
Issue: 2
Volume: 8
Year: 2018
Keywords: technology strategic planning; renewable energy; multi-attribute decision-making; fuzzy logic.
File-URL: http://www.inderscience.com/link.php?id=92917
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:ids:ijbcrm:v:8:y:2018:i:2:p:158-181
Template-Type: ReDIF-Article 1.0
Author-Name: Bokolo Anthony Jr.
Author-X-Name-First: Bokolo Anthony
Author-X-Name-Last: Jr.
Title: Using Green IT governance as a catalyst to improve sustainable practices adoption: a contingency theory perspective
Abstract:
The study aims to investigate Green information technology (IT) governance implementation as a facilitator for sustainable practice adoption in IT-based organisation. Accordingly, a Green IT governance model is developed based on the contingency theory and IT governance archetypes to facilitate sustainable practice adoption. The model components and associated metrics were verified using semi-structured interview and sustainability documents from three IT-based organisations in Malaysia. Results from this study show the developed model supports IT practitioners in IT-based organisations implements Green IT governance for sustainable practice adoption. Further results reveal that the model supports decision makers define roles and responsibilities and also creates the relevant relationships within IT organisations. Theoretically, this study provides insights to IT managers towards acquiring an agenda on the implication of Green IT governance for their organisation. Practically, this study provides a reference on how IT organisations can support decision-making when implementing environmental governance strategies.
Journal: Int. J. of Business Continuity and Risk Management
Pages: 124-157
Issue: 2
Volume: 8
Year: 2018
Keywords: environmental governance; Green IT governance; sustainability; IT governance contingency theory; components and metrics; business continuity.
File-URL: http://www.inderscience.com/link.php?id=92918
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:ids:ijbcrm:v:8:y:2018:i:2:p:124-157
Template-Type: ReDIF-Article 1.0
Author-Name: Martín Ezequiel Masci
Author-X-Name-First: Martín Ezequiel
Author-X-Name-Last: Masci
Author-Name: María Teresa Casparri
Author-X-Name-First: María Teresa
Author-X-Name-Last: Casparri
Author-Name: Javier Ignacio García-Fronti
Author-X-Name-First: Javier Ignacio
Author-X-Name-Last: García-Fronti
Title: Expert's opinion impact on financial risk management
Abstract:
The present work proposes to incorporate expert's opinions into the traditional calculation of financial risk management models. These traditional quantitative models ignore qualitative knowledge available (subjective and mathematically imprecise). To do this, this paper articulates value-at-risk (VaR) practioner's perspective with experts' opinion. This work focuses on the techniques associated with the mathematical approach as opposed to the behavioural one and within this approach, contrasting those axiomatic with the Bayesian. The authors argue that expert's judgement is relevant to market risk management. In particular, financial risks are especially sensitive to decision makers' opinions. Three strategies are proposed. Firstly, Bayesian techniques, secondly, fuzzy logic with VaR approximation through triangular fuzzy numbers (TFN) and thirdly, expert discussion through Delphi dynamics are considered.
Journal: Int. J. of Business Continuity and Risk Management
Pages: 249-261
Issue: 3
Volume: 8
Year: 2018
Keywords: risk management; expert's opinion; value at risk; Bayesian techniques; fuzzy logic.
File-URL: http://www.inderscience.com/link.php?id=94163
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:ids:ijbcrm:v:8:y:2018:i:3:p:249-261
Template-Type: ReDIF-Article 1.0
Author-Name: María José Fernandez
Author-X-Name-First: María José
Author-X-Name-Last: Fernandez
Title: Linguistic work quality index
Abstract:
Work quality measures are fundamental to study population welfare. Labour activity occupies most of the workers' day, so quantifying people's welfare by means of work quality is central. Decent work indicators have the aim of establishing the characteristics of an employment relationship to verify that a job is carried out under conditions of freedom, equality, security and human dignity. The purpose of these indicators is to measure the degree to which a certain goal has been achieved in order to develop precise policies to improve people's standard of living. In this paper, a proposal is developed to measure decent work deficit in a linguistic way. A complete decent work index model is formulated using linguistic labels and the linguistic weighted average operator. Finally, some comments are made about the benefits of using linguistic variables when measuring work quality.
Journal: Int. J. of Business Continuity and Risk Management
Pages: 262-279
Issue: 3
Volume: 8
Year: 2018
Keywords: linguistic models; linguistic weighted average; decent work index; labour conditions; subjectivity; linguistic index; work quality index; welfare.
File-URL: http://www.inderscience.com/link.php?id=94164
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:ids:ijbcrm:v:8:y:2018:i:3:p:262-279
Template-Type: ReDIF-Article 1.0
Author-Name: Hugo Eduardo Vásquez-Calderón
Author-X-Name-First: Hugo Eduardo
Author-X-Name-Last: Vásquez-Calderón
Author-Name: Pedro Lara-Velázquez
Author-X-Name-First: Pedro
Author-X-Name-Last: Lara-Velázquez
Author-Name: Sergio Gerardo De-los-Cobos-Silva
Author-X-Name-First: Sergio Gerardo
Author-X-Name-Last: De-los-Cobos-Silva
Author-Name: Miguel A. Gutiérrez-Andrade
Author-X-Name-First: Miguel A.
Author-X-Name-Last: Gutiérrez-Andrade
Author-Name: Eric Alfredo Rincón-García
Author-X-Name-First: Eric Alfredo
Author-X-Name-Last: Rincón-García
Author-Name: Roman Anselmo Mora-Gutiérrez
Author-X-Name-First: Roman Anselmo
Author-X-Name-Last: Mora-Gutiérrez
Author-Name: Antonin Ponsich
Author-X-Name-First: Antonin
Author-X-Name-Last: Ponsich
Title: Scatter search for the soft graph colouring problem
Abstract:
The soft graph colouring problem is a model that has been used to solve problems such as scheduling under uncertainty, assignment of frequencies in the radioelectric spectrum, and pattern recognition that in certain problems can deal with risky items susceptible of error I or error II. This problem is NP-hard and requires efficient metaheuristic algorithms in order to solve it. In this paper, a scatter search algorithm is proposed and developed. This algorithm gives the best solutions in the test instances used to this day.
Journal: Int. J. of Business Continuity and Risk Management
Pages: 200-218
Issue: 3
Volume: 8
Year: 2018
Keywords: scatter search; graph colouring; heuristic; optimisation.
File-URL: http://www.inderscience.com/link.php?id=94169
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:ids:ijbcrm:v:8:y:2018:i:3:p:200-218
Template-Type: ReDIF-Article 1.0
Author-Name: Jorge Flores-Cruz
Author-X-Name-First: Jorge
Author-X-Name-Last: Flores-Cruz
Author-Name: Pedro Lara-Velázquez
Author-X-Name-First: Pedro
Author-X-Name-Last: Lara-Velázquez
Author-Name: Miguel A. Gutiérrez-Andrade
Author-X-Name-First: Miguel A.
Author-X-Name-Last: Gutiérrez-Andrade
Author-Name: Sergio Gerardo De-los-Cobos-Silva
Author-X-Name-First: Sergio Gerardo
Author-X-Name-Last: De-los-Cobos-Silva
Author-Name: Eric Alfredo Rincón-García
Author-X-Name-First: Eric Alfredo
Author-X-Name-Last: Rincón-García
Author-Name: Roman Anselmo Mora-Gutiérrez
Author-X-Name-First: Roman Anselmo
Author-X-Name-Last: Mora-Gutiérrez
Author-Name: Antonin Ponsich
Author-X-Name-First: Antonin
Author-X-Name-Last: Ponsich
Title: An unsupervised classifier system using soft graph colouring
Abstract:
Unsupervised classifiers do not require previous training to achieve their task, on the contrary, they are able to propose alternative classifications that make more sense using raw data instead of human interpretation. In this article an unsupervised classifier system using the soft graph colouring model is presented. This model has the ability to deal with risk and the probability of committing Type I or II errors, for instance, in medical diagnosis, where we want to minimise the risk of a mistaken prognosis. The proposed model is evaluated using some classical instances, and the results are compared with other classifiers, given in all cases solutions as good or better than supervised classifiers.
Journal: Int. J. of Business Continuity and Risk Management
Pages: 186-199
Issue: 3
Volume: 8
Year: 2018
Keywords: pattern recognition; unsupervised classification; soft graph colouring; SGC; optimisation.
File-URL: http://www.inderscience.com/link.php?id=94172
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:ids:ijbcrm:v:8:y:2018:i:3:p:186-199
Template-Type: ReDIF-Article 1.0
Author-Name: Robert Richardson
Author-X-Name-First: Robert
Author-X-Name-Last: Richardson
Author-Name: Heechang Shin
Author-X-Name-First: Heechang
Author-X-Name-Last: Shin
Author-Name: Oredola Soluade
Author-X-Name-First: Oredola
Author-X-Name-Last: Soluade
Title: A vehicle recall index and the sales impact by type of recall
Abstract:
A vehicle recall index is created to measure the safety provided by a vehicle. Compared to J. D. Power's indices, the newly created index provides additional, useful information for consumers to use when buying a car. The importance of recall information is reflected in the negative impact on sales. The impact is measured using an event study methodology to evaluate the sales loss and time to recover from a major recall. The effect of two types of recalls is compared: 1) Toyota's unintentional problem from a defective gas pedal design causing injuries; 2) Volkswagen's intentional modification of the emission control unit to report false information resulting in no injuries. The model indicates that Toyota's sales declined for the subsequent five months, while Volkswagen's sales were affected for eleven months. The conclusion is that consumers responded more to the Volkswagen 'cheating' scandal in their purchase of a new car.
Journal: Int. J. of Business Continuity and Risk Management
Pages: 232-248
Issue: 3
Volume: 8
Year: 2018
Keywords: auto safety; vehicle recall index; Toyota; Volkswagen.
File-URL: http://www.inderscience.com/link.php?id=94174
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:ids:ijbcrm:v:8:y:2018:i:3:p:232-248
Template-Type: ReDIF-Article 1.0
Author-Name: José Carlos Javier Velasco
Author-X-Name-First: José Carlos Javier
Author-X-Name-Last: Velasco
Author-Name: Sergio Gerardo De-los-Cobos-Silva
Author-X-Name-First: Sergio Gerardo
Author-X-Name-Last: De-los-Cobos-Silva
Author-Name: Eric Alfredo Rincón-García
Author-X-Name-First: Eric Alfredo
Author-X-Name-Last: Rincón-García
Author-Name: Miguel Ángel Gutiérrez-Andrade
Author-X-Name-First: Miguel Ángel
Author-X-Name-Last: Gutiérrez-Andrade
Author-Name: Roman Anselmo Mora-Gutiérrez
Author-X-Name-First: Roman Anselmo
Author-X-Name-Last: Mora-Gutiérrez
Author-Name: Antonin Ponsich
Author-X-Name-First: Antonin
Author-X-Name-Last: Ponsich
Author-Name: Pedro Lara-Velázquez
Author-X-Name-First: Pedro
Author-X-Name-Last: Lara-Velázquez
Title: PSO-3P for the portfolio optimisation problem
Abstract:
Identifying risks and opportunities in an investment is an important issue for investors. There are different strategies used to maximise profits and minimise the risk. However, some problems cannot be efficiently solved using classical techniques of operations research. Thus, heuristic approach seems to be a good option to find high quality solutions in a limited amount of time. We propose a new variant of particle swarm optimisation named PSO-3P to solve the constrained portfolio optimisation problem. The proposed algorithm was tested over five well-known benchmark data sets and the obtained results proved to be highly competitive since they outperform those reported in the specialised literature in almost all tackled instances.
Journal: Int. J. of Business Continuity and Risk Management
Pages: 219-231
Issue: 3
Volume: 8
Year: 2018
Keywords: PSO; PSO-3P; portfolio optimisation; Markowitz model.
File-URL: http://www.inderscience.com/link.php?id=94175
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:ids:ijbcrm:v:8:y:2018:i:3:p:219-231
Template-Type: ReDIF-Article 1.0
Author-Name: Nwoye F. Chukwunonso
Author-X-Name-First: Nwoye F.
Author-X-Name-Last: Chukwunonso
Title: Technology advancement in developing countries: the policy variables
Abstract:
Technology has been identified as being crucial to sustainable economic growth and development. Its advancement varies amongst countries and even within them depending on certain influential variables. These variables were identified and categorised using factor analysis. The impact of each of the variables on technological advancement of developing economies were quantified using weighting scheme from factor analysis and aggregated into a composite - technological capability by linear and geometric aggregation techniques. The categories identified and their overall contributions to the composite include: exposure to new/foreign technology - 25.87%, technology transfer mechanism - 11.68%, macroeconomic environment - 16.91% and incentives - 17.02%. The analysis showed that the impact of weight on scores of the composite was minimal, while variations in scores computed using linear aggregation technique were also reflected in those computed by geometric aggregation even though more sensitive. The impact of weighting and aggregation technique on technological capability rankings of economies based on computed composite was verified using sensitivity analysis.
Journal: Int. J. of Business Continuity and Risk Management
Pages: 281-302
Issue: 4
Volume: 8
Year: 2018
Keywords: technology advancement; developing economies; policy; foreign technology; technology transfer mechanism; macroeconomics; factor analysis; FA.
File-URL: http://www.inderscience.com/link.php?id=95285
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:ids:ijbcrm:v:8:y:2018:i:4:p:281-302
Template-Type: ReDIF-Article 1.0
Author-Name: Milind A. Mandlik
Author-X-Name-First: Milind A.
Author-X-Name-Last: Mandlik
Author-Name: Djavlonbek Kadirov
Author-X-Name-First: Djavlonbek
Author-X-Name-Last: Kadirov
Title: Big data approaches and outcome of information asymmetry: opportunities for future research
Abstract:
The purpose of this paper is to advocate reorientation of current managerial practices in the light of growing reliance on Big Data strategies by contemporary firms, to make them more consumer-centric in nature. Big data strategies by their very nature and modalities lead to heightened levels of information asymmetry which by default have the capacity to disempower the very user that contributes towards the data driven insights. The fundamental driver for writing this paper is not to criticise big data strategies per se, but to suggest; it is merely a tool which can be equally used for consumer entrapment, as well as consumer empowerment. This paper wishes to contribute to the intellectual debate among academics, policy maker, and practitioners alike; en-route for a type of big data-driven managerial orientation that balances the consumers' right to market-based transparency, and the enterprise's need for economic viability.
Journal: Int. J. of Business Continuity and Risk Management
Pages: 303-318
Issue: 4
Volume: 8
Year: 2018
Keywords: big data marketing; information asymmetry; stakeholder management; consumer empowerment.
File-URL: http://www.inderscience.com/link.php?id=95287
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:ids:ijbcrm:v:8:y:2018:i:4:p:303-318
Template-Type: ReDIF-Article 1.0
Author-Name: Arshan Bhullar
Author-X-Name-First: Arshan
Author-X-Name-Last: Bhullar
Author-Name: Pushpinder Singh Gill
Author-X-Name-First: Pushpinder Singh
Author-X-Name-Last: Gill
Title: Digitalisation through mobile commerce: the impact of demographic and behavioural intention factors on mobile commerce usage activities
Abstract:
The internet has created extraordinary business opportunities for e-commerce and with the use of internet on mobile devices a new form of business model has emerged called mobile commerce. The users' demographic and behavioural intention factors influences the kind of mobile commerce usage activities they do. So the current research is an effort to examine such impact of demographic and behavioural intention variables on mobile commerce usage activities. A questionnaire survey was conducted among 193 internet mobile users from three universities of Punjab and the data was analysed by employing structural equation modelling. The results show that age and education have different impact on different m-commerce usage activities but gender has no significant relationship. This study also confirms the importance of behavioural intention factors like perceived ease of use, perceived usefulness, perceived enjoyment and trust. The findings of this research show strong empirical base for all marketers and strategists who are looking to take full advantage of the strength of m-commerce.
Journal: Int. J. of Business Continuity and Risk Management
Pages: 335-351
Issue: 4
Volume: 8
Year: 2018
Keywords: digitalisation; mobile commerce; demographic factors; behavioural intention factors; m-commerce usage activities; mobile users.
File-URL: http://www.inderscience.com/link.php?id=95288
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:ids:ijbcrm:v:8:y:2018:i:4:p:335-351
Template-Type: ReDIF-Article 1.0
Author-Name: Mohammad Mahdi Nasiri
Author-X-Name-First: Mohammad Mahdi
Author-X-Name-Last: Nasiri
Author-Name: Hani Shahmoradi-Moghadam
Author-X-Name-First: Hani
Author-X-Name-Last: Shahmoradi-Moghadam
Author-Name: Seyed Ali Torabi
Author-X-Name-First: Seyed Ali
Author-X-Name-Last: Torabi
Title: A hub covering flow network design resilient to major disruptions and supply/demand uncertainties
Abstract:
This paper presents a robust methodology to deal with a novel resilient hub covering flow problem (HCFP) with capacity and budget constraints. The primary HCFP is to determine the best network setting, which minimises the total cost of establishing hubs and shipping the demand, subject to some constraints. In order to cope with the inherent uncertainty associated with the input data, a robust HCFP (RHCFP) is proposed. In order to evaluate the performance of the presented models, we use the Monte Carlo simulation technique to measure the efficiency of the robust model. In order to select the best conservatism level, we combine several measures for evaluating the value of a solution using a criterion called total performance measure (TPM), which demonstrates that the robust optimisation model performs better than the deterministic model in all cases.
Journal: Int. J. of Business Continuity and Risk Management
Pages: 319-334
Issue: 4
Volume: 8
Year: 2018
Keywords: hub covering flow problem; HCFP; capacity constraint; robust optimisation; resilience.
File-URL: http://www.inderscience.com/link.php?id=95289
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:ids:ijbcrm:v:8:y:2018:i:4:p:319-334
Template-Type: ReDIF-Article 1.0
Author-Name: Shu-Hao Chang
Author-X-Name-First: Shu-Hao
Author-X-Name-Last: Chang
Title: Exploring key technology networks of telematics using patent analysis
Abstract:
This study used telematics patents as the basis for analysis, constructing a technological network for telematics patents. The results revealed that the key telematics technologies are mainly focused on vehicle operation, traffic control systems, wireless networks, and road transport; the key technologies were not focused on specific technologies fields, but possessed the characteristics of multiple technological areas. In addition, the development of services or facilities specially adapted for wireless communication networks has been the most vigorous technological development. The trend indicates that the development of wireless network technology for telematics remains the focus; examples include the compatibility problem of cars and vehicles, 5G development, and even the standardisation and regulatory bodies, certification, and approval processes in the field of wireless communications. The patent technology network model constructed in this study can serve as a reference for the government to promote emerging technologies and allocate research and development resources.
Journal: Int. J. of Business Continuity and Risk Management
Pages: 352-368
Issue: 4
Volume: 8
Year: 2018
Keywords: telematics; patent network; network analysis; key technology.
File-URL: http://www.inderscience.com/link.php?id=95295
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:ids:ijbcrm:v:8:y:2018:i:4:p:352-368