Classification and characterization of US consumers based on their perceptions of risk of tablet use in international hotels

2019 ◽  
Vol 10 (3) ◽  
pp. 233-254 ◽  
Author(s):  
Cristian Morosan ◽  
Agnes DeFranco

Purpose Cyber-attacks on hotel information systems could threaten the privacy of consumers and the integrity of the data they exchange upon connecting their mobile devices to hotel networks. As the perceived cyber-security risk may be reflected heterogeneously within the US consumer population traveling internationally, the purpose of this study is to examine such heterogeneity to uncover classes of US consumers based on their perceptions of risk of using tablets for various tasks when staying in hotels abroad. Design/methodology/approach Using data collected from 1,016 US consumers who stayed in hotels abroad, this study used latent profile analysis (LPA) to classify the consumers based on their perceptions of risk associated with several tablet use behaviors in hotels. Findings The analysis uncovered four latent classes and produced a characterization of these classes according to several common behavioral (frequency of travel, the continent of the destination, duration of stay and purpose of travel) and demographic (gender, age, income and education) consumer characteristics. Originality/value Being the first study that classifies consumers based on the risk of using tablets in hotels while traveling internationally, this study brings the following contributions: offers a methodology of classifying (segmenting) consumer markets based on their cyber-security risk perceptions, uses LPA, which provides opportunities for an accurate and generalizable characterization of multivariate data that comprehensively illustrate consumer behavior and broadens the perspective offered by the current literature by focusing on consumers who travel from their US residence location to international destinations.

2020 ◽  
Vol 13 (1) ◽  
pp. 103-128 ◽  
Author(s):  
Shipra Pandey ◽  
Rajesh Kumar Singh ◽  
Angappa Gunasekaran ◽  
Anjali Kaushik

Purpose The purpose of this study is to examine cyber security risks in globalized supply chains (SCs). It has been seen to have a greater impact on the performance of SCs. The information and communication technology of a firm, which enhances the efficiency and effectiveness in the SC, could simultaneously be the cause of vulnerabilities and exposure to security threats. Researchers have primarily focussed on the cyber-physical system (CPS) vulnerabilities impacting SC. This paper tries to categorize the cyber security risks occurring because of the SCs operating in CPS. Design/methodology/approach Based on the flow of information along the upstream and downstream SC, this paper tries to identify cyber security risks in the global SCs. It has further tried to categorize these cyber security risks from a strategic point of view. Findings This paper tries to identify the various cyber security risk and cyber-attacks in globalized SC for improving the performance. The 16 cyber security risks have been categorized into three categories, namely, supply risk, operational risk and demand risk. The paper proposes a framework consisting of different cyber-attacks across the information that flows in global SCs along-with suitable mitigation strategies. Research limitations/implications The paper presents the conceptual model of cyber security risks and cyber-attacks in globalized SCs based on literature review and industry experts. Further validation and scale development of these risks can be done through empirical study. Practical implications This paper provides significant managerial insights by developing a framework for understanding the cyber security risks in terms of the drivers of these risks and how to deal with them. From a managerial perspective, this framework can be used as a decision-making process while considering different cyber security risks across the stages of globalized SCs. Originality/value The major contribution of this study is the identification and categorization of cyber security risks across the global SCs in the digital age. Thus, this paper introduces a new phenomenon to the field of management that has the potential to investigate new areas of future research. Based on the categorization, the paper provides insights on how cyber security risks impact the continuity of SC operations.


2021 ◽  
pp. 1-18
Author(s):  
Jia Chen ◽  
Xiaochen Zhou ◽  
Nan Lu

Abstract Older parents in China rely heavily on their adult children for instrumental assistance. In different multi-child families, multiple offspring may co-operate in providing instrumental support to older parents in distinct ways in terms of how much support they provide on average and how much differentiation exists between them when they provide such support within a family. We aimed to identify different within-family patterns in relation to multiple offspring's instrumental support to an older parent in Chinese multi-child families, and to investigate potential predictors for different within-family patterns. Using data from the China Family Panel Studies (2016), we had a working sample of 5,790 older adults aged 60+ (mean = 68.54, standard deviation = 6.60). We employed latent profile analysis (LPA) to classify within-family patterns and multinomial logistic regression to investigate predictors. Our findings identified three within-family patterns: dissociated (59.10%), highly differentiated (29.60%) and united-filial (11.30%). Older parents in the highly differentiated families tended to be older, mothers, divorced/widowed and to have poorer physical health compared to their counterparts in the dissociated families. In contrast, the composition characteristics of multiple adult children played more important roles in determining the united-filial within-family pattern. The united-filial families were more likely to have fewer adult children, at least one adult daughter and at least one co-residing adult child.


2021 ◽  
pp. 095679762097056
Author(s):  
Morgana Lizzio-Wilson ◽  
Emma F. Thomas ◽  
Winnifred R. Louis ◽  
Brittany Wilcockson ◽  
Catherine E. Amiot ◽  
...  

Extensive research has identified factors influencing collective-action participation. However, less is known about how collective-action outcomes (i.e., success and failure) shape engagement in social movements over time. Using data collected before and after the 2017 marriage-equality debate in Australia, we conducted a latent profile analysis that indicated that success unified supporters of change ( n = 420), whereas failure created subgroups among opponents ( n = 419), reflecting four divergent responses: disengagement (resigned acceptors), moderate disengagement and continued investment (moderates), and renewed commitment to the cause using similar strategies (stay-the-course opponents) or new strategies (innovators). Resigned acceptors were least inclined to act following failure, whereas innovators were generally more likely to engage in conventional action and justify using radical action relative to the other profiles. These divergent reactions were predicted by differing baseline levels of social identification, group efficacy, and anger. Collective-action outcomes dynamically shape participation in social movements; this is an important direction for future research.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Jiaojiao Qu ◽  
Shuming Zhao ◽  
Yixuan Zhao

Purpose This study aims to identify profiles of inclusion in the workplace to provide evidence-based guidance to build an inclusive organization. Design/methodology/approach Latent profile analysis (LPA), a person-centred classification analytical tool, was applied to determine the subtypes of inclusion with Mplus 7.4, using two-wave data collected from 368 employees in 8 Chinese companies. Findings Three subgroups were identified: identity inclusion group (the highest level of inclusion, 34.0%), value inclusion group (the moderate level of inclusion, 47.5%) and low inclusion group (the lowest level of inclusion, 18.5%). The findings indicate that groups with male, aged and highly educated members, as well as members from developed areas generally tend to feel more included and greater inclusion relates to more favourable outcomes and fewer detrimental consequences. Research limitations/implications As this study was conducted only in China, the results may not be generalizable to non-Chinese contexts. Practical implications The results may help organizational leaders develop a deeper understanding of the significance and the crux of inclusion. To address the duality of workforce diversity, managers can take initiatives to create an inclusive organization. To achieve inclusion, managers should pay attention to ways of improving the perceptions of inclusion among all employees. Originality/value This is among the first studies to identify the variants in inclusion in China using LPA. It reveals the subtypes and characteristics of inclusion and can serve as a starting point to explore how to realize organizational inclusion in theory and practice.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Guangchong Chen ◽  
Jiayu Chen ◽  
Yuchun Tang ◽  
Yan Ning ◽  
Qiming Li

PurposeCollaboration is essential to BIM-enabled construction projects (BECPs). To facilitate collaboration, various strategies have been proposed. Usually, project team adopts single collaboration strategy for convenience. However, BIM-based collaboration is rather dynamic and exposed to a lot of barriers and risks, which easily changes collaboration conditions among partners. Therefore, better understanding of collaboration conditions in BECPs is crucial to develop flexible and suitable strategies. To fill in the gap, this study intends to identify typical collaboration profiles in BECPs and develop a profile-oriented strategy selection framework.Design/methodology/approachThis study establishes a six-dimensional collaborative behavior matric based on a comprehensive literature review to profile collaboration. Then a questionnaire survey is conducted to collect the collaboration data from 162 BECPs in China. Finally, latent profile analysis (LPA) is utilized to identify the typical collaboration profiles in BECPs.FindingsThrough LPA, four profiles are identified, including restricted collaboration profile, smarmy collaboration profile, intuitive collaboration profile, and modest collaboration profile. A profile-oriented strategy selection framework is also established to match strategies with collaboration profiles. Two major categories of strategies are proposed to promote these collaboration profiles including trust building and elevating strategies and collaborative behaviors facilitating strategies.Research limitations/implicationsThese identified profiles can provide an insightful understanding on the diversified collaboration conditions in BECPs.Practical implicationsThe profile-oriented strategy selection framework will help managers develop strategies flexibly to promote collaboration in BECPs.Originality/valueThis study validates four typical collaboration profiles in BECPs. Moreover, a profile-oriented strategy selection framework is also established for collaboration facilitation in BECPs.


2019 ◽  
Vol 3 (2) ◽  
pp. 209-228
Author(s):  
Roberto Pessoa de Queiroz Falcão ◽  
Murilo Carrazedo Marques da Costa Filho ◽  
Jorge Brantes Ferreira

Purpose The purpose of this paper is to segment travelers by their predispositions regarding the adoption of smartphones to purchase travel-related services, which is crucial for developing specific marketing strategies for each group of tourists. Design/methodology/approach A survey was conducted with 1,014 Brazilian travelers assessing their smartphone usage frequency and predispositions regarding travel purchases. The authors selected three variables related to the users’ acceptance of technology (perceived usefulness, ease of use and intentions to use smartphones for tourism purchases) and m-commerce perceptions of risk. Segmentation was conducted employing cluster analysis. Findings The authors identified three significantly different clusters of travel consumers: “Risk Ignorers,” “Cautious Users” and “Conservatives.” Risk perceptions appeared to be the main discriminating variable, followed by perceptions that smartphone apps are useful and free of effort. Research limitations/implications The non-probabilistic snowball sampling technique of Brazilian travelers may limit the generalization of the findings. Also, the use of intentions as one of our clustering variables instead of actual purchase behavior might bring limitations. Practical implications Segmentation enables the development of specific marketing strategies for each group, encompassing different risk profiles. Cautious travelers demand the development of safe and trustworthy m-commerce environments, as well as reassuring communication approach to reduce their perceptions of risk in performing mobile-mediated transactions. Conservatives demand marketers to build simpler and more straightforward apps to entice them. Originality/value The study reveals more fine-grained nuances to the role of mobile technology and its impact on travelers, unveiling important differences across travelers’ predispositions toward smartphone adoption that is distinctively associated with usage patterns regarding their risk profiles.


2019 ◽  
Vol 57 (12) ◽  
pp. 3346-3363 ◽  
Author(s):  
Ricardo Gouveia Rodrigues ◽  
João J.M. Ferreira ◽  
Teresa Felgueira

Purpose The need for dynamic and innovative skills and the importance of resources and individuals in pursuit of new opportunities prove to be extremely vital for the higher education institutions (HEI). The purpose of this paper is to develop a taxonomy of academics from HEI, based on their individual entrepreneurial orientation (EO). Design/methodology/approach The population in study was composed of teachers and researchers from worldwide HEI. The data collection was conducted through a questionnaire sent by an e-mail and the authors used the I-ENTRE-U scale to identify entrepreneurial-oriented teachers and researchers from HEI. A Latent Profile Analysis (LPA) was conducted to identify profiles of researchers with similar values in four EO dimensions. Findings The study allowed the authors to identify five profiles of researchers: downers, achievers, followers, defenders and rebels. Research limitations/implications The results can be an important starting point for other researchers and practitioners hoping to evaluate academics’ EO in a higher education sector. The taxonomy also allows wider predictions about the behaviour of the profile members of profiles and relates it with other variables such as performance. Further contributions may be added by extending the data gathering from different geographical areas and/or different academic contexts, such that future studies could apply other LPA techniques and compare the results. Originality/value Only few studies have focussed on individual EO of scientists/academics, considering different national and regional contexts. To the best of the authors’ knowledge, this is the first empirical study that develops a taxonomy of academics from HEI, based on their individual EO.


Author(s):  
Abhilash Panda ◽  
Andrew Bower

Purpose The purpose of this paper is to concentrate on the place of cyber security risk in the framework of global commitments adopted in 2015 to reduce disaster risks in an all-hazards approach. It explores the correlations between traditional risks associated with critical infrastructures – as understood by the Sendai framework – cyber security risks and the cascading effects characteristic of today’s complex and interrelated shocks and stresses. It takes a step further, expanding the focus of traditionally understood technological risks to explore cyber security risks, at the heart of our societies’ digital transformations,and showcase opportunities from the European context. Design/methodology/approach By reviewing existing literature on cyber security, disaster resilience and cascading disasters, this paper highlights current challenges and good practices undertaken by various governments. Findings Understanding disaster risks is a precondition to improving the mitigation of impacts of existing risks and preventing new risks. Effective risk reduction relies on a solid understanding of losses resulting from events to inform future actions, and on the assessment of risks relying on a robust evidence base and state-of-the-art scientific capacity to model and simulate potential hazards. In this context, embedding cyber security risks, and the complexity of cascading impacts in improving the understanding of disaster risks, calls for appropriate methods and tools allowing for a multi-risk and holistic focus to the assessment of risks and the planning of risk management capacities that follow. Research limitations/implications Globally and in Europe, focus on interconnected risk and their impacts is steadily increasing. Risk assessments are still conservative; incorporation of cyber resilience into national and local level DRR plans is yet not visible. Originality/value Existing research is restricted to cyber security and disaster resilience, as separated subjects. This paper, for the first time, brings together the interconnection between the two topic options to address them.


2019 ◽  
Vol 24 (7) ◽  
pp. 672-685
Author(s):  
Greta Ontrup ◽  
Justine Patrzek

Purpose Research on workaholism distinguishes between enthusiastic and non-enthusiastic workaholics, a typology used in many studies. Yet, the methodical foundation on which the derivation of the types is based lacks robust statistical evidence. The purpose of this paper is twofold: first, to replicate the often-cited typology of enthusiastic and non-enthusiastic workaholics (and non-workaholic subtypes), based on model-based clustering as a robust statistical technique; and second, to validate the class solution based on affective, cognitive and behavioral measures. Design/methodology/approach The study followed a cross-sectional design, targeting a sample of people from various fields of industries. An online questionnaire was distributed; workaholism was assessed with McMillan et al.’s (2002) Work-BAT-R scales. A total of 537 respondents’ data were analyzed. Findings Latent profile analysis extracted four classes, namely, enthusiastic and non-enthusiastic workaholics and relaxed and uninvolved non-workaholics. As expected, workers characterized by high enjoyment (enthusiasts and relaxed) showed higher job satisfaction and occupational self-efficacy than workers with low enjoyment (non-enthusiasts and uninvolved). Relaxed workers reported higher life satisfaction than all other classes. Originality/value The robust methodology applied establishes a good starting point for future studies investigating workers subtypes: the replication suggests that the workaholic subtypes might be core profiles that occur in different populations with regularity. As a next step, the replication of the typology based on alternative operationalizations of workaholism is proposed for future studies.


2020 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Julie Levesque-Côté ◽  
Claude Fernet ◽  
Alexandre J.S. Morin ◽  
Stéphanie Austin

PurposeAlthough one of the central premises of authentic leadership theory is that authentic leaders mobilize their followers, the underlying motivational mechanisms of this process remain poorly understood. Drawing on self-determination theory, this study aims to fill that gap by examining authentic leadership practices (ALP) as theoretical antecedents of employees' motivation profiles.Design/methodology/approachLatent profile analyses conducted on a sample of 501 employees revealed four profiles: self-determined, unmotivated, highly motivated and moderately motivated.FindingsALP were associated with a higher likelihood of membership into the most adaptive motivation profiles. Employees in these profiles displayed more optimal job functioning: higher organizational commitment and performance, and lower intentions to leave their organization.Originality/valueThese findings underscore the predictive power of autonomous motivation for employee functioning and provide new insights into how ALP can improve work motivation, and hence job functioning. Our results account not only for how ALP affects the complete range of behavioral regulations at work but also the different patterns in which these regulations combine within employees.


Sign in / Sign up

Export Citation Format

Share Document