Template-Type: ReDIF-Article 1.0 Author-Name: Christine T. Berry Author-X-Name-First: Christine T. Author-X-Name-Last: Berry Author-Name: Ronald L. Berry Author-X-Name-First: Ronald L. Author-X-Name-Last: Berry Title: An initial assessment of small business risk management approaches for cyber security threats Abstract: While larger companies have resources to address cyber security issues, small companies often do not. Usually, a business owner or his immediate family members handle many different roles within the small business. Because of a lack of information technology knowledge and resources to hire that knowledge, many small businesses are at a great risk of having their systems compromised. The purpose of this paper is to report the findings of a field study that included over 370 interviews with small business owners about their approach to risk management, including those related to cyber security threats. Results indicate that small business owners are often likely to have the basic tools related to technology risk management in place, but lack the policies, procedures and training to secure their information resources. Additionally, responses indicated a majority of respondents do not use strong passwords to protect their information assets. Journal: Int. J. of Business Continuity and Risk Management Pages: 1-10 Issue: 1 Volume: 8 Year: 2018 Keywords: small business risk management; cyber security; internet security; cyber crime. File-URL: http://www.inderscience.com/link.php?id=90580 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijbcrm:v:8:y:2018:i:1:p:1-10 Template-Type: ReDIF-Article 1.0 Author-Name: Nijaz Bajgoric Author-X-Name-First: Nijaz Author-X-Name-Last: Bajgoric Title: Reengineering business information systems to support business continuity Abstract: The paper aims at presenting an implementation framework for reengineering traditional business information systems (ISs) into ISs that support business continuity (BC) or 'always-on' ISs. The framework has been developed by using a methodology framework based on a literature review and Churchman's (1971) systemic model, particularly his definition of 'system designer'. Four reengineering drivers are identified: downtime costs, IT-oriented business models, business continuity and IS-systemic perspective. Technology enablers for implementation of such systems are presented as well. Presented framework brings some additional dimensions with regard to modern ISs particularly those related to human aspects (Churchman's client, designer and decision maker). It explores critical aspects of modern ISs such as high availability (HA) ratios, continuous data access, always-on computing, continuous computing technologies, as well as managerial aspects with regard to the roles of CIOs, system admins and business continuity managers. As such, the presented framework can be used in the projects of transforming traditional business ISs into always-on ISs. Journal: Int. J. of Business Continuity and Risk Management Pages: 11-35 Issue: 1 Volume: 8 Year: 2018 Keywords: systems approach; information system; business continuity; always-on business; always-on information systems. File-URL: http://www.inderscience.com/link.php?id=90581 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijbcrm:v:8:y:2018:i:1:p:11-35 Template-Type: ReDIF-Article 1.0 Author-Name: Petter Gottschalk Author-X-Name-First: Petter Author-X-Name-Last: Gottschalk Title: Evaluation of fraud examinations: a principal-agent study of private internal investigations Abstract: Agency theory suggests that problems in terms of conflicting preferences, knowledge asymmetry and different attitudes towards risks can have a negative impact on work outcome from the agent to the principal. In private internal investigations, the client is the principal, while the fraud examiner is the agent. Based on a sample of 49 reports of investigation from Norway, this article presents empirical results testing agency theory. Results indicate that agency issues do have a significant influence on the contribution from internal investigations, but the influence is not necessarily negative. While different attitudes towards risk have a negative impact, knowledge asymmetry has a positive impact on the contribution from an investigation. A possible explanation for this surprising result is that examiners are experts in other areas than the client, which is the reason why examiners are hired by clients. Journal: Int. J. of Business Continuity and Risk Management Pages: 36-48 Issue: 1 Volume: 8 Year: 2018 Keywords: agency theory; fraud examination; internal investigations; conflicting preferences. File-URL: http://www.inderscience.com/link.php?id=90592 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijbcrm:v:8:y:2018:i:1:p:36-48 Template-Type: ReDIF-Article 1.0 Author-Name: Chung-Kuang Hou Author-X-Name-First: Chung-Kuang Author-X-Name-Last: Hou Title: Examining users' intention to continue using business intelligence systems from the perspectives of end-user computing satisfaction and individual performance Abstract: End-user computing satisfaction (EUCS) and individual performance have been recognised by many researchers as critical determinants influencing users' intention to use information systems. Even though a great deal of attention has been paid to the practical decision-making benefits of BI system adoption, there is still a lack of research to explore the nature of EUCS with BI systems and to investigate factors that affect users' intention to continue using BI systems after adopting the systems. Therefore, the purpose of this study is to empirically investigate the relationships between EUCS, continuance intention, and individual performance with BI systems. The empirical data collected from 330 users in the Taiwanese electronics industry showed that higher levels of EUCS can lead to increased BI continuance intention and improved individual performance and that higher levels of individual performance will lead to higher levels of BI continuance intention. Journal: Int. J. of Business Continuity and Risk Management Pages: 49-70 Issue: 1 Volume: 8 Year: 2018 Keywords: user satisfaction; business intelligence; continuance intention; individual performance; structural equation models. File-URL: http://www.inderscience.com/link.php?id=90593 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijbcrm:v:8:y:2018:i:1:p:49-70 Template-Type: ReDIF-Article 1.0 Author-Name: Betul Sekendiz Author-X-Name-First: Betul Author-X-Name-Last: Sekendiz Author-Name: Kevin Norton Author-X-Name-First: Kevin Author-X-Name-Last: Norton Author-Name: Patrick Keyzer Author-X-Name-First: Patrick Author-X-Name-Last: Keyzer Author-Name: Joachim Dietrich Author-X-Name-First: Joachim Author-X-Name-Last: Dietrich Author-Name: Ian R. Coyle Author-X-Name-First: Ian R. Author-X-Name-Last: Coyle Author-Name: Shannon Gray Author-X-Name-First: Shannon Author-X-Name-Last: Gray Author-Name: Caroline F. Finch Author-X-Name-First: Caroline F. Author-X-Name-Last: Finch Title: Emergency preparedness in fitness facilities: bridging the gap between policy and practice Abstract: Fitness facilities are an important contributor to economies through preventative health policies of governments. Therefore, it is crucial that they are capable of ensuring the health and safety of their users during emergency situations under relevant work health and safety (WHS) legislation. This study aimed to analyse emergency response preparedness in fitness facilities in Australia and develop evidence-based strategic recommendations, using a mixed methods approach. An onsite observational audit tool and in-depth interviews were conducted at a sample of regional and metropolitan fitness facilities. The results showed that fitness facilities showed a lack of operational emergency response practices that requires an integrated approach to risk management by fitness facility operators. This gap between policy and practice has significant implications for all stakeholders involved in fitness service provision, including government agencies, academia and industry governing organisations. Journal: Int. J. of Business Continuity and Risk Management Pages: 71-85 Issue: 1 Volume: 8 Year: 2018 Keywords: fitness facilities; risk management; safety; emergency preparedness; emergency response; policy development; observational audit; fitness industry. File-URL: http://www.inderscience.com/link.php?id=90595 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijbcrm:v:8:y:2018:i:1:p:71-85 Template-Type: ReDIF-Article 1.0 Author-Name: Ahmad Yousef Areiqat Author-X-Name-First: Ahmad Yousef Author-X-Name-Last: Areiqat Author-Name: Asaad Alali Author-X-Name-First: Asaad Author-X-Name-Last: Alali Author-Name: Yousef Arikat Author-X-Name-First: Yousef Author-X-Name-Last: Arikat Title: Risk management to avoid project failure: a comparison study of construction projects in the GCC Abstract: This study aims to identify the basic failure and success factors of construction projects in the six Gulf Cooperation Council (GCC) countries using secondary and qualitative data, articles, journals and case studies to draw some conclusions. The study found that falling oil prices have a significant impact on projects because they affect their financial support and that poor risk management caused delays and cost overruns. Additionally, the lack of a well-established plan or good planning before commencing the project leads to delays and ultimately project failure. Recommendations and conclusions, such as increasing and improving the risk management training necessary to predict and avoid the deeper risks in different projects, are based on the analysis and the understanding of the literature review and case studies. Setting up alternative back-up plans in the event the project fails and PESTEL risk analysis, which focuses on multidimensional factors, should be used. Journal: Int. J. of Business Continuity and Risk Management Pages: 87-105 Issue: 2 Volume: 8 Year: 2018 Keywords: risk management; construction projects; Gulf Cooperation Council; GCC. File-URL: http://www.inderscience.com/link.php?id=92910 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijbcrm:v:8:y:2018:i:2:p:87-105 Template-Type: ReDIF-Article 1.0 Author-Name: Sachin Saini Author-X-Name-First: Sachin Author-X-Name-Last: Saini Author-Name: Doordarshi Singh Author-X-Name-First: Doordarshi Author-X-Name-Last: Singh Title: Lean practices for consummating competitive priorities in SMEs: a critical review Abstract: Fierce competition in the present business world has necessitated the adoption of lean practices for survival in business. To retain their market share, small and medium enterprises have to eradicate waste to attain competitive priorities. A detailed review of 103 lean stories has revealed diverse practices based on region, size and type of the sector. The focus here is on identifying the best lean practices. The study, split into five parts: 1) lean tenets; 2) lean manufacturing practices in SMEs; 3) comparison table of lean practices; 4) classification of lean practices in model form; 5) barriers to lean practices, will help to identify the best lean practices to achieve competitive priorities especially in developing countries. In case of barricades, the management has a pivotal role to play in transforming the organisation to lean practices which make it viable to attain competitive priorities such as productivity, cost, quality, delivery, safety, morale and financial performance. Journal: Int. J. of Business Continuity and Risk Management Pages: 106-123 Issue: 2 Volume: 8 Year: 2018 Keywords: lean manufacturing; LM; lean production; literature review; lean practices; small and medium enterprises; SMEs. File-URL: http://www.inderscience.com/link.php?id=92916 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijbcrm:v:8:y:2018:i:2:p:106-123 Template-Type: ReDIF-Article 1.0 Author-Name: Maryam Ebrahimi Author-X-Name-First: Maryam Author-X-Name-Last: Ebrahimi Title: Development of renewable energy technology strategies using hybrid fuzzy MADM in SMEs Abstract: In this study, fuzzy analytic network process (FANP) method is used in combination with fuzzy decision-making trial and evaluation laboratory (FDEMATEL), within the framework of SWOT analysis, to propose technology strategies (TSs) in renewable energy small and medium enterprises (SMEs). Both methods are applied to real life cases including decision data of human judgments with vague preferences. The used data is gathered from twelve experts working in SMEs within Iran's renewable energy sector; they are selected via a non-random sampling method. DEMATEL is a powerful method to capture the causal relationship between criteria and ANP with the help of DEMATEL looks for possible interdependencies among the elements, so as to evaluate different strategies and have the optimum one selected. SWOT analysis model is essentially related to the evaluation of the company's internal and external environments. The results of the present research were employed to present and prioritise different TSs. Journal: Int. J. of Business Continuity and Risk Management Pages: 158-181 Issue: 2 Volume: 8 Year: 2018 Keywords: technology strategic planning; renewable energy; multi-attribute decision-making; fuzzy logic. File-URL: http://www.inderscience.com/link.php?id=92917 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijbcrm:v:8:y:2018:i:2:p:158-181 Template-Type: ReDIF-Article 1.0 Author-Name: Bokolo Anthony Jr. Author-X-Name-First: Bokolo Anthony Author-X-Name-Last: Jr. Title: Using Green IT governance as a catalyst to improve sustainable practices adoption: a contingency theory perspective Abstract: The study aims to investigate Green information technology (IT) governance implementation as a facilitator for sustainable practice adoption in IT-based organisation. Accordingly, a Green IT governance model is developed based on the contingency theory and IT governance archetypes to facilitate sustainable practice adoption. The model components and associated metrics were verified using semi-structured interview and sustainability documents from three IT-based organisations in Malaysia. Results from this study show the developed model supports IT practitioners in IT-based organisations implements Green IT governance for sustainable practice adoption. Further results reveal that the model supports decision makers define roles and responsibilities and also creates the relevant relationships within IT organisations. Theoretically, this study provides insights to IT managers towards acquiring an agenda on the implication of Green IT governance for their organisation. Practically, this study provides a reference on how IT organisations can support decision-making when implementing environmental governance strategies. Journal: Int. J. of Business Continuity and Risk Management Pages: 124-157 Issue: 2 Volume: 8 Year: 2018 Keywords: environmental governance; Green IT governance; sustainability; IT governance contingency theory; components and metrics; business continuity. File-URL: http://www.inderscience.com/link.php?id=92918 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijbcrm:v:8:y:2018:i:2:p:124-157 Template-Type: ReDIF-Article 1.0 Author-Name: Martín Ezequiel Masci Author-X-Name-First: Martín Ezequiel Author-X-Name-Last: Masci Author-Name: María Teresa Casparri Author-X-Name-First: María Teresa Author-X-Name-Last: Casparri Author-Name: Javier Ignacio García-Fronti Author-X-Name-First: Javier Ignacio Author-X-Name-Last: García-Fronti Title: Expert's opinion impact on financial risk management Abstract: The present work proposes to incorporate expert's opinions into the traditional calculation of financial risk management models. These traditional quantitative models ignore qualitative knowledge available (subjective and mathematically imprecise). To do this, this paper articulates value-at-risk (VaR) practioner's perspective with experts' opinion. This work focuses on the techniques associated with the mathematical approach as opposed to the behavioural one and within this approach, contrasting those axiomatic with the Bayesian. The authors argue that expert's judgement is relevant to market risk management. In particular, financial risks are especially sensitive to decision makers' opinions. Three strategies are proposed. Firstly, Bayesian techniques, secondly, fuzzy logic with VaR approximation through triangular fuzzy numbers (TFN) and thirdly, expert discussion through Delphi dynamics are considered. Journal: Int. J. of Business Continuity and Risk Management Pages: 249-261 Issue: 3 Volume: 8 Year: 2018 Keywords: risk management; expert's opinion; value at risk; Bayesian techniques; fuzzy logic. File-URL: http://www.inderscience.com/link.php?id=94163 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijbcrm:v:8:y:2018:i:3:p:249-261 Template-Type: ReDIF-Article 1.0 Author-Name: María José Fernandez Author-X-Name-First: María José Author-X-Name-Last: Fernandez Title: Linguistic work quality index Abstract: Work quality measures are fundamental to study population welfare. Labour activity occupies most of the workers' day, so quantifying people's welfare by means of work quality is central. Decent work indicators have the aim of establishing the characteristics of an employment relationship to verify that a job is carried out under conditions of freedom, equality, security and human dignity. The purpose of these indicators is to measure the degree to which a certain goal has been achieved in order to develop precise policies to improve people's standard of living. In this paper, a proposal is developed to measure decent work deficit in a linguistic way. A complete decent work index model is formulated using linguistic labels and the linguistic weighted average operator. Finally, some comments are made about the benefits of using linguistic variables when measuring work quality. Journal: Int. J. of Business Continuity and Risk Management Pages: 262-279 Issue: 3 Volume: 8 Year: 2018 Keywords: linguistic models; linguistic weighted average; decent work index; labour conditions; subjectivity; linguistic index; work quality index; welfare. File-URL: http://www.inderscience.com/link.php?id=94164 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijbcrm:v:8:y:2018:i:3:p:262-279 Template-Type: ReDIF-Article 1.0 Author-Name: Hugo Eduardo Vásquez-Calderón Author-X-Name-First: Hugo Eduardo Author-X-Name-Last: Vásquez-Calderón Author-Name: Pedro Lara-Velázquez Author-X-Name-First: Pedro Author-X-Name-Last: Lara-Velázquez Author-Name: Sergio Gerardo De-los-Cobos-Silva Author-X-Name-First: Sergio Gerardo Author-X-Name-Last: De-los-Cobos-Silva Author-Name: Miguel A. Gutiérrez-Andrade Author-X-Name-First: Miguel A. Author-X-Name-Last: Gutiérrez-Andrade Author-Name: Eric Alfredo Rincón-García Author-X-Name-First: Eric Alfredo Author-X-Name-Last: Rincón-García Author-Name: Roman Anselmo Mora-Gutiérrez Author-X-Name-First: Roman Anselmo Author-X-Name-Last: Mora-Gutiérrez Author-Name: Antonin Ponsich Author-X-Name-First: Antonin Author-X-Name-Last: Ponsich Title: Scatter search for the soft graph colouring problem Abstract: The soft graph colouring problem is a model that has been used to solve problems such as scheduling under uncertainty, assignment of frequencies in the radioelectric spectrum, and pattern recognition that in certain problems can deal with risky items susceptible of error I or error II. This problem is NP-hard and requires efficient metaheuristic algorithms in order to solve it. In this paper, a scatter search algorithm is proposed and developed. This algorithm gives the best solutions in the test instances used to this day. Journal: Int. J. of Business Continuity and Risk Management Pages: 200-218 Issue: 3 Volume: 8 Year: 2018 Keywords: scatter search; graph colouring; heuristic; optimisation. File-URL: http://www.inderscience.com/link.php?id=94169 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijbcrm:v:8:y:2018:i:3:p:200-218 Template-Type: ReDIF-Article 1.0 Author-Name: Jorge Flores-Cruz Author-X-Name-First: Jorge Author-X-Name-Last: Flores-Cruz Author-Name: Pedro Lara-Velázquez Author-X-Name-First: Pedro Author-X-Name-Last: Lara-Velázquez Author-Name: Miguel A. Gutiérrez-Andrade Author-X-Name-First: Miguel A. Author-X-Name-Last: Gutiérrez-Andrade Author-Name: Sergio Gerardo De-los-Cobos-Silva Author-X-Name-First: Sergio Gerardo Author-X-Name-Last: De-los-Cobos-Silva Author-Name: Eric Alfredo Rincón-García Author-X-Name-First: Eric Alfredo Author-X-Name-Last: Rincón-García Author-Name: Roman Anselmo Mora-Gutiérrez Author-X-Name-First: Roman Anselmo Author-X-Name-Last: Mora-Gutiérrez Author-Name: Antonin Ponsich Author-X-Name-First: Antonin Author-X-Name-Last: Ponsich Title: An unsupervised classifier system using soft graph colouring Abstract: Unsupervised classifiers do not require previous training to achieve their task, on the contrary, they are able to propose alternative classifications that make more sense using raw data instead of human interpretation. In this article an unsupervised classifier system using the soft graph colouring model is presented. This model has the ability to deal with risk and the probability of committing Type I or II errors, for instance, in medical diagnosis, where we want to minimise the risk of a mistaken prognosis. The proposed model is evaluated using some classical instances, and the results are compared with other classifiers, given in all cases solutions as good or better than supervised classifiers. Journal: Int. J. of Business Continuity and Risk Management Pages: 186-199 Issue: 3 Volume: 8 Year: 2018 Keywords: pattern recognition; unsupervised classification; soft graph colouring; SGC; optimisation. File-URL: http://www.inderscience.com/link.php?id=94172 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijbcrm:v:8:y:2018:i:3:p:186-199 Template-Type: ReDIF-Article 1.0 Author-Name: Robert Richardson Author-X-Name-First: Robert Author-X-Name-Last: Richardson Author-Name: Heechang Shin Author-X-Name-First: Heechang Author-X-Name-Last: Shin Author-Name: Oredola Soluade Author-X-Name-First: Oredola Author-X-Name-Last: Soluade Title: A vehicle recall index and the sales impact by type of recall Abstract: A vehicle recall index is created to measure the safety provided by a vehicle. Compared to J. D. Power's indices, the newly created index provides additional, useful information for consumers to use when buying a car. The importance of recall information is reflected in the negative impact on sales. The impact is measured using an event study methodology to evaluate the sales loss and time to recover from a major recall. The effect of two types of recalls is compared: 1) Toyota's unintentional problem from a defective gas pedal design causing injuries; 2) Volkswagen's intentional modification of the emission control unit to report false information resulting in no injuries. The model indicates that Toyota's sales declined for the subsequent five months, while Volkswagen's sales were affected for eleven months. The conclusion is that consumers responded more to the Volkswagen 'cheating' scandal in their purchase of a new car. Journal: Int. J. of Business Continuity and Risk Management Pages: 232-248 Issue: 3 Volume: 8 Year: 2018 Keywords: auto safety; vehicle recall index; Toyota; Volkswagen. File-URL: http://www.inderscience.com/link.php?id=94174 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijbcrm:v:8:y:2018:i:3:p:232-248 Template-Type: ReDIF-Article 1.0 Author-Name: José Carlos Javier Velasco Author-X-Name-First: José Carlos Javier Author-X-Name-Last: Velasco Author-Name: Sergio Gerardo De-los-Cobos-Silva Author-X-Name-First: Sergio Gerardo Author-X-Name-Last: De-los-Cobos-Silva Author-Name: Eric Alfredo Rincón-García Author-X-Name-First: Eric Alfredo Author-X-Name-Last: Rincón-García Author-Name: Miguel Ángel Gutiérrez-Andrade Author-X-Name-First: Miguel Ángel Author-X-Name-Last: Gutiérrez-Andrade Author-Name: Roman Anselmo Mora-Gutiérrez Author-X-Name-First: Roman Anselmo Author-X-Name-Last: Mora-Gutiérrez Author-Name: Antonin Ponsich Author-X-Name-First: Antonin Author-X-Name-Last: Ponsich Author-Name: Pedro Lara-Velázquez Author-X-Name-First: Pedro Author-X-Name-Last: Lara-Velázquez Title: PSO-3P for the portfolio optimisation problem Abstract: Identifying risks and opportunities in an investment is an important issue for investors. There are different strategies used to maximise profits and minimise the risk. However, some problems cannot be efficiently solved using classical techniques of operations research. Thus, heuristic approach seems to be a good option to find high quality solutions in a limited amount of time. We propose a new variant of particle swarm optimisation named PSO-3P to solve the constrained portfolio optimisation problem. The proposed algorithm was tested over five well-known benchmark data sets and the obtained results proved to be highly competitive since they outperform those reported in the specialised literature in almost all tackled instances. Journal: Int. J. of Business Continuity and Risk Management Pages: 219-231 Issue: 3 Volume: 8 Year: 2018 Keywords: PSO; PSO-3P; portfolio optimisation; Markowitz model. File-URL: http://www.inderscience.com/link.php?id=94175 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijbcrm:v:8:y:2018:i:3:p:219-231 Template-Type: ReDIF-Article 1.0 Author-Name: Nwoye F. Chukwunonso Author-X-Name-First: Nwoye F. Author-X-Name-Last: Chukwunonso Title: Technology advancement in developing countries: the policy variables Abstract: Technology has been identified as being crucial to sustainable economic growth and development. Its advancement varies amongst countries and even within them depending on certain influential variables. These variables were identified and categorised using factor analysis. The impact of each of the variables on technological advancement of developing economies were quantified using weighting scheme from factor analysis and aggregated into a composite - technological capability by linear and geometric aggregation techniques. The categories identified and their overall contributions to the composite include: exposure to new/foreign technology - 25.87%, technology transfer mechanism - 11.68%, macroeconomic environment - 16.91% and incentives - 17.02%. The analysis showed that the impact of weight on scores of the composite was minimal, while variations in scores computed using linear aggregation technique were also reflected in those computed by geometric aggregation even though more sensitive. The impact of weighting and aggregation technique on technological capability rankings of economies based on computed composite was verified using sensitivity analysis. Journal: Int. J. of Business Continuity and Risk Management Pages: 281-302 Issue: 4 Volume: 8 Year: 2018 Keywords: technology advancement; developing economies; policy; foreign technology; technology transfer mechanism; macroeconomics; factor analysis; FA. File-URL: http://www.inderscience.com/link.php?id=95285 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijbcrm:v:8:y:2018:i:4:p:281-302 Template-Type: ReDIF-Article 1.0 Author-Name: Milind A. Mandlik Author-X-Name-First: Milind A. Author-X-Name-Last: Mandlik Author-Name: Djavlonbek Kadirov Author-X-Name-First: Djavlonbek Author-X-Name-Last: Kadirov Title: Big data approaches and outcome of information asymmetry: opportunities for future research Abstract: The purpose of this paper is to advocate reorientation of current managerial practices in the light of growing reliance on Big Data strategies by contemporary firms, to make them more consumer-centric in nature. Big data strategies by their very nature and modalities lead to heightened levels of information asymmetry which by default have the capacity to disempower the very user that contributes towards the data driven insights. The fundamental driver for writing this paper is not to criticise big data strategies per se, but to suggest; it is merely a tool which can be equally used for consumer entrapment, as well as consumer empowerment. This paper wishes to contribute to the intellectual debate among academics, policy maker, and practitioners alike; en-route for a type of big data-driven managerial orientation that balances the consumers' right to market-based transparency, and the enterprise's need for economic viability. Journal: Int. J. of Business Continuity and Risk Management Pages: 303-318 Issue: 4 Volume: 8 Year: 2018 Keywords: big data marketing; information asymmetry; stakeholder management; consumer empowerment. File-URL: http://www.inderscience.com/link.php?id=95287 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijbcrm:v:8:y:2018:i:4:p:303-318 Template-Type: ReDIF-Article 1.0 Author-Name: Arshan Bhullar Author-X-Name-First: Arshan Author-X-Name-Last: Bhullar Author-Name: Pushpinder Singh Gill Author-X-Name-First: Pushpinder Singh Author-X-Name-Last: Gill Title: Digitalisation through mobile commerce: the impact of demographic and behavioural intention factors on mobile commerce usage activities Abstract: The internet has created extraordinary business opportunities for e-commerce and with the use of internet on mobile devices a new form of business model has emerged called mobile commerce. The users' demographic and behavioural intention factors influences the kind of mobile commerce usage activities they do. So the current research is an effort to examine such impact of demographic and behavioural intention variables on mobile commerce usage activities. A questionnaire survey was conducted among 193 internet mobile users from three universities of Punjab and the data was analysed by employing structural equation modelling. The results show that age and education have different impact on different m-commerce usage activities but gender has no significant relationship. This study also confirms the importance of behavioural intention factors like perceived ease of use, perceived usefulness, perceived enjoyment and trust. The findings of this research show strong empirical base for all marketers and strategists who are looking to take full advantage of the strength of m-commerce. Journal: Int. J. of Business Continuity and Risk Management Pages: 335-351 Issue: 4 Volume: 8 Year: 2018 Keywords: digitalisation; mobile commerce; demographic factors; behavioural intention factors; m-commerce usage activities; mobile users. File-URL: http://www.inderscience.com/link.php?id=95288 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijbcrm:v:8:y:2018:i:4:p:335-351 Template-Type: ReDIF-Article 1.0 Author-Name: Mohammad Mahdi Nasiri Author-X-Name-First: Mohammad Mahdi Author-X-Name-Last: Nasiri Author-Name: Hani Shahmoradi-Moghadam Author-X-Name-First: Hani Author-X-Name-Last: Shahmoradi-Moghadam Author-Name: Seyed Ali Torabi Author-X-Name-First: Seyed Ali Author-X-Name-Last: Torabi Title: A hub covering flow network design resilient to major disruptions and supply/demand uncertainties Abstract: This paper presents a robust methodology to deal with a novel resilient hub covering flow problem (HCFP) with capacity and budget constraints. The primary HCFP is to determine the best network setting, which minimises the total cost of establishing hubs and shipping the demand, subject to some constraints. In order to cope with the inherent uncertainty associated with the input data, a robust HCFP (RHCFP) is proposed. In order to evaluate the performance of the presented models, we use the Monte Carlo simulation technique to measure the efficiency of the robust model. In order to select the best conservatism level, we combine several measures for evaluating the value of a solution using a criterion called total performance measure (TPM), which demonstrates that the robust optimisation model performs better than the deterministic model in all cases. Journal: Int. J. of Business Continuity and Risk Management Pages: 319-334 Issue: 4 Volume: 8 Year: 2018 Keywords: hub covering flow problem; HCFP; capacity constraint; robust optimisation; resilience. File-URL: http://www.inderscience.com/link.php?id=95289 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijbcrm:v:8:y:2018:i:4:p:319-334 Template-Type: ReDIF-Article 1.0 Author-Name: Shu-Hao Chang Author-X-Name-First: Shu-Hao Author-X-Name-Last: Chang Title: Exploring key technology networks of telematics using patent analysis Abstract: This study used telematics patents as the basis for analysis, constructing a technological network for telematics patents. The results revealed that the key telematics technologies are mainly focused on vehicle operation, traffic control systems, wireless networks, and road transport; the key technologies were not focused on specific technologies fields, but possessed the characteristics of multiple technological areas. In addition, the development of services or facilities specially adapted for wireless communication networks has been the most vigorous technological development. The trend indicates that the development of wireless network technology for telematics remains the focus; examples include the compatibility problem of cars and vehicles, 5G development, and even the standardisation and regulatory bodies, certification, and approval processes in the field of wireless communications. The patent technology network model constructed in this study can serve as a reference for the government to promote emerging technologies and allocate research and development resources. Journal: Int. J. of Business Continuity and Risk Management Pages: 352-368 Issue: 4 Volume: 8 Year: 2018 Keywords: telematics; patent network; network analysis; key technology. File-URL: http://www.inderscience.com/link.php?id=95295 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:ids:ijbcrm:v:8:y:2018:i:4:p:352-368