9 results on '"Lynn, Theo"'
Search Results
2. The antecedents and consequences of legitimate corporate participation: a research agenda
- Author
-
Kenny, David, Sinclair, Gary, and Lynn, Theo
- Subjects
Marketing ,World Wide Web ,Electronic commerce ,darknet, dark net, dark web ,research agenda ,Information technology - Abstract
The DarkNet is a purposefully hidden collection of disconnected web sites that are not indexed by conventional or mainstream search engines, are not accessible by conventional means, and requires specialised software, specific knowledge, and authorisation to gain access. While typically associated with illegality and criminality, there are an increasing number of legitimate organisations active on the DarkNet. While explored widely in Computer Science, Humanities and Social Science, Engineering and Medicine, there is a paucity of research in the business and IS disciplines. The objective of this summary paper is to introduce the DarkNet, summarise extant business and IS research, albeit limited, and outline a proposed model and set of propositions to explore a previously unexplored relationship in the business and IS literature, the antecedents and consequences of the participation of legitimate organisations on the DarkNet.
- Published
- 2023
3. Disrupting Finance
- Author
-
Lynn, Theo, Mooney, John G., Rosati, Pierangelo, and Cummins, Mark
- Subjects
Business ,Management science ,Management ,Industrial management ,Information technology ,Business—Data processing ,Bank marketing ,Big data ,thema EDItEUR::K Economics, Finance, Business and Management::KJ Business and Management::KJM Management and management techniques::KJMV Management of specific areas::KJMV6 Research and development management ,thema EDItEUR::K Economics, Finance, Business and Management::KJ Business and Management::KJQ Business mathematics and systems ,thema EDItEUR::K Economics, Finance, Business and Management::KN Industry and industrial studies::KNS Hospitality and service industries ,thema EDItEUR::U Computing and Information Technology::UN Databases - Abstract
This open access Pivot demonstrates how a variety of technologies act as innovation catalysts within the banking and financial services sector. Traditional banks and financial services are under increasing competition from global IT companies such as Google, Apple, Amazon and PayPal whilst facing pressure from investors to reduce costs, increase agility and improve customer retention. Technologies such as blockchain, cloud computing, mobile technologies, big data analytics and social media therefore have perhaps more potential in this industry and area of business than any other. This book defines a fintech ecosystem for the 21st century, providing a state-of-the art review of current literature, suggesting avenues for new research and offering perspectives from business, technology and industry.
- Published
- 2019
- Full Text
- View/download PDF
4. LEGITIMIZING #BLOCKCHAIN: AN EMPIRICAL ANALYSIS OF FIRM-LEVEL SOCIAL MEDIA MESSAGING ON TWITTER.
- Author
-
Lynn, Theo, Rosati, Pierangelo, and Fox, Grace
- Subjects
BLOCKCHAINS ,EMPIRICAL research ,INFORMATION technology ,TECHNOLOGICAL innovations - Abstract
Blockchain technology has been claimed to have the potential to disrupt a large number of industries. Despite all the hype around it, blockchain remains at a nascent state. In the early stage of the development of an IT innovation, its success is to a degree contingent on building legitimacy around it. This seems to be particularly relevant in the context of blockchain due to the questionable reputation that its most famous application, the bitcoin, has gained over time. This paper explores the usage of social media by four key actors in the blockchain ecosystem --media, IT, financial services and consulting firms -- over a calendar year and through the lens of 'organizing visions' to identify how these organizations are trying to legitimize blockchain. Our results show that these actors employ three primary legitimation micro-level strategies through two types of legitimation mechanisms -- advertising affiliations with influential field level actors (pragmatic legitimacy), describing positive market responses to blockchain and emphasizing its ongoing development (cognitive legitimacy), and describing characteristics of blockchain that are in alignment with current technological best practices (cognitive legitimacy). This paper extends the current literature on IT innovation adoption and legitimation, and contributes to the nascent literature on blockchain. [ABSTRACT FROM AUTHOR]
- Published
- 2018
5. Towards an Understanding of Farmers' Mobile Technology Adoption: A Comparison of Adoption and Continuance Intentions.
- Author
-
Fox, Grace, Mooney, John, Rosati, Pierangelo, Paulsson, Victoria, and Lynn, Theo
- Subjects
INFORMATION technology ,MOBILE apps ,DIGITAL technology ,SOCIAL influence ,AGRICULTURAL technology - Abstract
Information technology such as farm management mobile applications present many opportunities to the farming community including reducing paper work, streamlining compliance requirements and providing data backups. However, many family farmers continue to resist adoption of these technologies. In order to improve adoption and sustained usage of these mobile technologies, it is imperative to understand the factors driving adoption and continuance intentions among this group. This study adopts a sequential mixed methods approach combing UTAUT with continuance intention models to examine the predictors of adoption and continuance intention among users and non-users of a mobile farm management application. This study highlights the importance of social influence in initial adoption decisions and the relevance of perceived usefulness and perceived ease of use for increasing intentions to continue use of the application. The study makes empirical and practical contributions for increasing adoption and sustaining usage of mobile technology within the farming community. [ABSTRACT FROM AUTHOR]
- Published
- 2018
6. Gifted techspectations: A report on information and communications technology usage and expectations Of Irish gifted and talented students for The Irish Centre For Talented Youth
- Author
-
Alexopoulos, Angelos, Bruton, Neil, Gorman, Louise, Linehan, Kieran, Lynn, Theo, and O'Leary, Michael
- Subjects
centre for talented youth ireland ,CTYI ,information technology ,communications technology ,ICT usage - Abstract
Gifted Techspectations is the first of a series of reports based on research by the DCU Leadership, Innovation and Knowledge Research Centre (LInK) based in DCU Business School. With its roots in an Irish business school, it is no surprise that LInK’s mission is to strengthen the competitiveness, productivity, innovation and entrepreneurial capacity of the Irish economy. Ireland’s next generation transformation will be enabled by information and communication technologies (ICT) and digital participation by members of Irish society. As a university research centre we have an important role to play in supporting education, industry and government to accelerate this transformation. With support from DCU Business School, Enterprise Ireland’s Innovation Voucher Programme, DCU’s Learning Innovation Unit, Cambridge University Press and the Nominet Foundation amongst others, LInK has undertaken a wide variety of activities to accelerate digital participation. These include applied research projects, seminar programmes, workshops and occasional research papers. In the last twelve months, 22 seminars, 5 workshops, and two 3-week courses have been held and over 200 Irish businesses and schools have benefited from LInK-related digital participation activities. Influenced by the US ECAR and Pew Internet and American Life projects, these digital participation activities were brought together under the Techspectations initiative in June 2010. The objective of Techspectations is to create both a body of research and analysis on ICT usage and expectations by Irish society and an interface for Irish education, industry and government institutions.
- Published
- 2010
7. AgriTech Innovators: A Study of Initial Adoption and Continued Use of a Mobile Digital Platform by Family-Operated Farming Enterprises †.
- Author
-
Fox, Grace, Mooney, John, Rosati, Pierangelo, and Lynn, Theo
- Subjects
MOBILE operating systems ,DIGITAL technology ,FARM management ,SOCIAL influence ,INFORMATION technology - Abstract
While information technology is playing a significant transformative role in virtually every industry, within the agriculture sector, family-operated farming enterprises have been slow to adopt IT solutions to manage their operations. This study adopts a sequential mixed-methods research design to examine the pre- and post-adoption phases of farmers' use of a mobile digital platform for farm management. Our findings show that farmers' initial acceptance of a mobile digital platform for farm management is shaped by social influence, which mediates the impact of performance and effort expectancy. Post-adoption continued use of the digital platform is influenced directly by performance and effort expectancy and indirectly by trust beliefs and social influence. Perceived work impediment indirectly influences post-adoption acceptance via effort expectancy. Our study untangles the direct and indirect influences of positive and negative perceptions on farmers' acceptance of a new innovative AgriTech digital platform in these different phases. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
8. Doing privacy right or doing privacy rights. Examining the influence of privacy activities in the nonmarket environment on consumer attitudes and intentions
- Author
-
Lyons, Valerie, Lynn, Theo, van der Werff, Lisa, and Fox, Grace
- Subjects
Business ethics ,Information technology ,Innovation - Abstract
Data breaches are rising in magnitude and cost, with technology and privacy threats advancing at a faster pace than privacy regulation. A more sustainable approach to privacy beyond regulation is required. Whilst privacy studies suggest that exceeding regulatory minimums reduces privacy incidents, there is a dearth of scholarship researching privacy activities beyond regulatory minimums. Organisations typically conduct activities beyond regulatory minimums in the nonmarket environment e.g., political and socially responsible activity. Thus, the nonmarket environment provides a starting point for insight into privacy activities beyond regulation. This research utilises a three-stage sequential mixed-methods approach. Each stage is underpinned by theories of control and justice. In the first stage, an Online Delphi Survey is conducted to develop a taxonomy of control-based and justice-based nonmarket privacy activities. A theoretical framework of four primary approaches to privacy in the nonmarket environment is then developed. In the second stage, a number of CSR (CSR) reports (n=90) are reviewed using thematic analysis (leveraging the taxonomy previously developed). Control and justice totals are then calculated for the privacy activities reported in these publications, enabling their approach to nonmarket privacy to be positioned in one of four primary nonmarket privacy orientations. In the third stage, a theoretical framework is developed, based on the Power Responsibility Equilibrium (PRE) theory. Using this framework, a number of hypotheses are formulated regarding the relationships between nonmarket privacy activities and consumer trust, privacy concern, and purchase intention/continuance intention. These hypotheses are explored quantitatively using an experimental vignette methodology (n=396 for the first experiment, and n=503 for the second experiment). Control is found to be associated with increased privacy concern, and reduced consumer trust and purchase/continuance intention. Justice is found to be associated with reduced privacy concern, and increased consumer trust and purchase/continuance intention. This research describes a typology of nonmarket privacy for the first time, and examines a previously unexplored phenomenon. This research extends PRE Theory to the context of nonmarket privacy activities. This research also extends CSR posture theory with the addition of an additional posture called the Warrior posture, and extends the three Generations of CSR with a Fourth Generation of CSR. The research findings provide insights which can assist organisations to address consumers’ privacy concerns and enhance their corporate reputation and bottom line results.
- Published
- 2022
9. Orchestration from the Cloud to the Edge
- Author
-
Jörg Domaschka, Frank Griesinger, Sergej Svorobej, Malika Bendechache, Lynn, Theo, Mooney, John G., Lee, Brian, and Endo, Patricia Takako
- Subjects
Service (systems architecture) ,business.industry ,Computer science ,Distributed computing ,Big data ,Symmetric multiprocessor system ,Cloud computing ,Information technology ,Computer simulation ,cloud computing ,edge computing ,fog computing, orchestration ,management ,container orchestration ,orchestration tools ,orchestration standards ,orchestration challenges ,orchestration architectures ,Software deployment ,Resource management ,Orchestration (computing) ,business ,Edge computing - Abstract
The effective management of complex and heterogeneous computing environments is one of the biggest challenges that service and infrastructure providers are facing in the cloud-to-thing continuum era. Advanced orchestration systems are required to support the resource management of large-scale cloud data centres integrated with the big data generation of IoT devices. The orchestration system should be aware about all available resources and their current status in order to perform dynamic allocations and enable short time deployment of applications. This chapter will review the state of the art with regards to orchestration along the cloud-to-thing continuum with a specific emphasis on container-based orchestration (e.g. Docker Swarm and Kubernetes) and fog-specific orchestration architectures (e.g. SORTS, SOAFI, ETSI IGS MEC, and CONCERT).
- Published
- 2020
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.