Existing studies offer very limited insight into how sellers may reduce consumers' perceived risk in order to make consumer-to-consumer electronic marketplaces more successful. Contrary to these studies, the empirical investigation reported in this article acknowledges the role of sellers in enabling these computer-mediated transaction platforms. The study focuses on how information provided by sellersabout themselves (i.e., seller information) and about their products (i.e., product information) can function as risk reduction signals and how these affect a buyer's inclination to purchase. Combining signaling theory with perceived risk theory, the authors present a research model that they test using structural equation modeling with data collected in two different electronic marketplaces, includingeBay.nl. The results indicate that while product and seller information are indeed important risk reduction signals, and as such can play an important role in stimulating purchasing, the risk reduction potential of these forms of information differs across the studied risk types. This article discusses these findings and explains how they contribute to signaling theory and perceived risk theory. Based on the findings, several practical implications for sellers active in electronic marketplaces and for the intermediaries operating these transaction systems are described.
DOCUMENT
Currently, promising new tools are under development that will enable crime scene investigators to analyze fingerprints or DNA-traces at the crime scene. While these technologies could help to find a perpetrator early in the investigation, they may also strengthen confirmation bias when an incorrect scenario directs the investigation this early. In this study, 40 experienced Crime scene investigators (CSIs) investigated a mock crime scene to study the influence of rapid identification technologies on the investigation. This initial study shows that receiving identification information during the investigation results in more accurate scenarios. CSIs in general are not as much reconstructing the event that took place, but rather have a “who done it routine.” Their focus is on finding perpetrator traces with the risk of missing important information at the start of the investigation. Furthermore, identification information was mostly integrated in their final scenarios when the results of the analysis matched their expectations. CSIs have the tendency to look for confirmation, but the technology has no influence on this tendency. CSIs should be made aware of the risks of this strategy as important offender information could be missed or innocent people could be wrongfully accused.
DOCUMENT
This study explores how journalists in highspeed newsrooms gather information, how gathering activities are temporally structured and how reliability manifests itself in information-gathering activities.
DOCUMENT
International Womans day in Katowice, presentation about Sustainable risk leadership
DOCUMENT
International Week workshop in Madrid over Sustainable Risk Leadership
DOCUMENT
Within recent years, Financial Credit Risk Assessment (FCRA) has become an increasingly important issue within the financial industry. Therefore, the search for features that can predict the credit risk of an organization has increased. Using multiple statistical techniques, a variance of features has been proposed. Applying a structured literature review, 258 papers have been selected. From the selected papers, 835 features have been identified. The features have been analyzed with respect to the type of feature, the information sources needed and the type of organization that applies the features. Based on the results of the analysis, the features have been plotted in the FCRA Model. The results show that most features focus on hard information from a transactional source, based on official information with a high latency. In this paper, we readdress and -present our earlier work [1]. We extended the previous research with more detailed descriptions of the related literature, findings, and results, which provides a grounded basis from which further research on FCRA can be conducted.
DOCUMENT
Purpose: The purpose of this study is to find determinants about risk resilience and develop a new risk resilience approach for (agricultural) enterprises. This approach creates the ability to respond resiliently to major environmental challenges and changes in the short term and adjust the management of the organization, and to learn and transform to adapt to the new environment in the long term while creating multiple value creation. Design/methodology: The authors present a new risk resilience approach for multiple value creation of (agricultural) enterprises, which consists of a main process starting with strategy design, followed by an environmental analysis, stakeholder collaboration, implement ESG goals, defining risk expose & response options, and report, learn & evaluate. In each step the organizational perspective, as well as the value chain/area perspective is considered and aligned. The authors have used focus groups and analysed literature from and outside the field of finance and accounting, to design this new approach. Findings: Researchers propose a new risk resilience approach for (agricultural) enterprises, based on a narrative about transforming to multiple value creation, founded determinants of risk resilience, competitive advantage and agricultural resilience. Originality and value: This study contributes by conceptualizing risk resilience for (agricultural) enterprises, by looking through a lens of multiple value creation in a dynamic context and based on insights from different fields, actual ESG knowledge, and determinants for risk resilience, competitive advantage and agricultural resilience.
DOCUMENT
The purpose of this study is to analyze the relationship between sustainable performance and risk management, whereby sustainability (innovation), interdisciplinarity and leadership give new insights into the traditional perspectives on performance and risk management in the field of accounting and finance.
MULTIFILE
Risk assessment plays an important role in forensic mental health care. The way the conclusions of those risk assessments are communicated varies considerably across instruments. In an effort to make them more comparable, Hanson, R. K., Bourgon, G., McGrath, R., Kroner, D. D., Amora, D. A., Thomas, S. S., & Tavarez, L. P. [2017. A five-level risk and needs system: Maximizing assessment results in corrections through the development of a common language. The Council of State Governments Justice Center. https:// csgjusticecenter.org/wp-content/uploads/2017/01/A-Five-Level-Risk-and-Needs-system_Report.pdf] developed the Five-Level Risk and Needs System, placing the conclusions of different instruments along five theoretically meaningful levels. The current study explores a Five-Level Risk and Needs system for violent recidivism to which the numerical codings of the HCR-20 Version 2 and its successor, the HCR-20V3 are calibrated, using a combined sample from six previous studies for the HCR-20 Version 2 (n = 411 males with a violent index offence) and a pilot sample for the HCR-20V3 (n = 66 males with a violent index offence). Baselines for the five levels were defined by a combination of theoretical (e.g. expert meetings) and empirical (e.g. literature review) considerations. The calibration of the HCR-20 Version 2 was able to detect four levels, from a combined level I/II to an adjusted level V. The provisional calibration of the HCR-20V3 showed a substantial overlap with the HCR-20 Version 2, with each level boundary having a 2-point difference. Implications for practice and future research are discussed.
DOCUMENT
The research described in this paper provides insights into tools and methods which are used by professional information workers to keep and to manage their personal information. A literature study was carried out on 23 scholar papers and articles, retrieved from the ACM Digital Library and Library and Information Science Abstracts (LISA). The research questions were: - How do information workers keep and manage their information sources? - What aims do they have when building personal information collections? - What problems do they experience with the use and management of their personal collections? The main conclusion from the literature is that professional information workers use different tools and approaches for personal information management, depending on their personal style, the types of information in their collections and the devices which they use for retrieval. The main problem that they experience is that of information fragmentation over different collections and different devices. These findings can provide input for improvement of information literacy curricula in Higher Education. It has been remarked that scholar research and literature on Personal Information Management do not pay a lot of attention to the keeping and management of (bibliographic) data from external documentation. How people process the information from those sources and how this stimulates their personal learning, is completely overlooked. [The original publication is available at www.elpub.net]
DOCUMENT