Search results

1 – 10 of over 3000
Article
Publication date: 1 February 2024

Sandeep Kaur, Harpreet Singh, Devesh Roy and Hardeep Singh

Despite the susceptibility of cotton crops to pest attacks in the Malwa Region of Indian Punjab, no crop insurance policy has been implemented there– not even the Pradhan Mantri…

Abstract

Purpose

Despite the susceptibility of cotton crops to pest attacks in the Malwa Region of Indian Punjab, no crop insurance policy has been implemented there– not even the Pradhan Mantri Fasal Bima Yojana (PMFBY), which is a central scheme. Therefore, this paper attempts to gauge the likely impact of the PMFBY on Punjab cotton farmers and assess the changes needed for greater uptake and effectiveness of PMFBY.

Design/methodology/approach

The authors have conducted a primary survey to conduct this study. Initially, the authors compared the costs of cotton production with the returns in two scenarios (with and without insurance). Additionally, the authors have applied a logistic regression framework to examine the determinants of the willingness of farmers to participate in the crop insurance market.

Findings

The study finds that net returns of cotton crops are conventionally small and insufficient to cope with damages from crop failure. Yet, PMFBY will require some modifications in the premium rate and the level of indemnity for its greater uptake among Punjab cotton farmers. Additionally, using the logistic regression framework, the authors find that an increase in awareness about crop insurance and farmers' perceptions about their crop failure in the near future reduces the willingness of the farmers to participate in the crop insurance markets.

Research limitations/implications

The present study looks for the viability of PMFBY in Indian Punjab for the cotton crop, which can also be extended to other crops.

Social implications

Punjab could also use crop insurance to encourage diversification in agriculture. There is a need for special packages for diversified crops under any crop insurance policy. Crops susceptible to volatility due to climate-related factors should be identified and provided with a special insurance package.

Originality/value

There exist very scant studies that have discussed the viability of a central crop insurance scheme in the agricultural-rich state of India, i.e. Punjab. Moreover, they do not also focus on crop losses accruing due to pest and insect attacks.

Details

Journal of Agribusiness in Developing and Emerging Economies, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2044-0839

Keywords

Article
Publication date: 11 January 2024

Mohd Syahidan Zainal Abidin, Mahani Mokhtar and Mahyuddin Arsat

Education for sustainable development (ESD) has gained significant attention, but integrating ESD into existing education systems is challenging. The study aims to explore the…

Abstract

Purpose

Education for sustainable development (ESD) has gained significant attention, but integrating ESD into existing education systems is challenging. The study aims to explore the challenges of ESD experienced by school leaders, focusing on the context of Malaysian schools.

Design/methodology/approach

The study uses a qualitative approach with a single-case study design. Eight school leaders involved in the Johor sustainable education action plan (JSEAP) were interviewed and analyzed. The study uses thematic analysis to identify the challenges and other causes associated with the implementation of ESD.

Findings

This study revealed that the school leaders perceived the ESD challenges at three levels. First, restriction to the standardized curriculum (systemic); second, resistance to change (organization) and third, awareness and readiness (individual). These themes stemmed from seven primary codes that school leaders encountered throughout the JSEAP program.

Research limitations/implications

This paper is limited to a case study of the chosen schools and cannot be extrapolated to a larger population.

Practical implications

The study benefits school leaders and educators concerned about ESD and its role in their schools and other academics interested in ESD.

Originality/value

To the authors' knowledge, this is the first study to investigate ESD challenges in Malaysia. The novel discovery of the three levels of ESD challenges helps readers better understand the recent phenomenon of ESD implementation and compare it to other settings.

Details

Qualitative Research Journal, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1443-9883

Keywords

Book part
Publication date: 5 April 2024

Emir Malikov, Shunan Zhao and Jingfang Zhang

There is growing empirical evidence that firm heterogeneity is technologically non-neutral. This chapter extends the Gandhi, Navarro, and Rivers (2020) proxy variable framework…

Abstract

There is growing empirical evidence that firm heterogeneity is technologically non-neutral. This chapter extends the Gandhi, Navarro, and Rivers (2020) proxy variable framework for structurally identifying production functions to a more general case when latent firm productivity is multi-dimensional, with both factor-neutral and (biased) factor-augmenting components. Unlike alternative methodologies, the proposed model can be identified under weaker data requirements, notably, without relying on the typically unavailable cross-sectional variation in input prices for instrumentation. When markets are perfectly competitive, point identification is achieved by leveraging the information contained in static optimality conditions, effectively adopting a system-of-equations approach. It is also shown how one can partially identify the non-neutral production technology in the traditional proxy variable framework when firms have market power.

Article
Publication date: 20 October 2023

Jyh-Bin Yang and Ying-Fu Chen

An S-curve is an essential project-management tool. However, it is difficult to adjust S-curve to deal with a force majeure event. The present study develops four valuable…

Abstract

Purpose

An S-curve is an essential project-management tool. However, it is difficult to adjust S-curve to deal with a force majeure event. The present study develops four valuable adjustment approaches, designed to achieve a compromise between the views of the client and contractor. These can be used to control projects after a force majeure event.

Design/methodology/approach

The present study develops four adjustment approaches, which can be used to achieve a compromise between the views of the client and those of the contractor when controlling projects after a force majeure. To determine the S-curves during a force majeure event, two approaches can be selected: BCWS (budgeted cost of scheduled work)-base approach, or BCWP (budgeted cost of work performed)-base approach. To determine the rest of S-curves after a force majeure event, two approaches can be considered: maintaining the original curve of the remaining BCWS, or allocating the original curve of the remaining BCWS. Based on the validation of three empirical cases, drawn from a professional project-management website, this study confirms the feasibility of four proposed empirical approaches and a selection procedure for S-curve adjustment.

Findings

The S-curve-adjustment approaches presented here can be used to deal with cases that are ahead of, on and behind schedule. Using the proposed approaches and selection procedure, contractors can easily revise S-curves and control projects more effectively. To deal with a force majeure event, such as COVID-19, they are strongly advised to adopt the approaches labeled SA-A1 (to adjust the S-curve based on the extension ratio multiplied by the difference in progress during the force majeure) and SA-B1 (to maintain the original curve of the remaining BCWS) for the A/E and E/F curves, respectively.

Research limitations/implications

The proposed approaches can be used in cases of continuous construction during force majeure events. If construction work is totally suspended during such an event, it will be necessary to fine-tune the proposed approaches.

Originality/value

Previous studies have used case-oriented or mathematical-simulation approaches to forecast S-curves. The present study proposes simple approaches that allow the client and contractor to adjust the S-curve easily after a force majeure event. These approaches can be used to adjust work and project-completion targets within an extended duration. Selecting the right S-curve adjustment approach can help to control the remainder of the project, reducing the possibility of delay claims.

Details

Engineering, Construction and Architectural Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0969-9988

Keywords

Article
Publication date: 22 January 2024

Kemal Gürkan Küçükergin, Yakup Kemal Özekici and Gonca Güzel Şahin

This paper aims to investigate, upon taking into consideration both symmetric and asymmetric effects, how the economic and psychological impact of the coronavirus disease 2019…

Abstract

Purpose

This paper aims to investigate, upon taking into consideration both symmetric and asymmetric effects, how the economic and psychological impact of the coronavirus disease 2019 (COVID-19) pandemic, solidarity and future anxiety affect travel intention and the willingness to support a destination (WSD). Furthermore, the study sheds light on whether these relationships vary between domestic and international destinations.

Design/methodology/approach

The data are collected from 379 potential tourists. To detect and analyze the symmetrical and asymmetric effects, the covariance-based structural equation modeling (CB-SEM) and the fuzzy-set qualitative comparative analysis (fsQCA) are employed, respectively.

Findings

It is observed that, whereas only the effects of solidarity on travel intention and WSD differ in the CB-SEM, the fsQCA results include different recipes for the two groups.

Originality/value

There has not been much research done yet on the influence of future anxiety on tourists' decisions. Furthermore, it has not been thoroughly investigated whether solidarity has a different function for destinations within and outside of the country. In this respect, the study of both symmetric and asymmetric effects represents an important contribution to the literature.

Details

Journal of Hospitality and Tourism Insights, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2514-9792

Keywords

Book part
Publication date: 5 April 2024

Taining Wang and Daniel J. Henderson

A semiparametric stochastic frontier model is proposed for panel data, incorporating several flexible features. First, a constant elasticity of substitution (CES) production…

Abstract

A semiparametric stochastic frontier model is proposed for panel data, incorporating several flexible features. First, a constant elasticity of substitution (CES) production frontier is considered without log-transformation to prevent induced non-negligible estimation bias. Second, the model flexibility is improved via semiparameterization, where the technology is an unknown function of a set of environment variables. The technology function accounts for latent heterogeneity across individual units, which can be freely correlated with inputs, environment variables, and/or inefficiency determinants. Furthermore, the technology function incorporates a single-index structure to circumvent the curse of dimensionality. Third, distributional assumptions are eschewed on both stochastic noise and inefficiency for model identification. Instead, only the conditional mean of the inefficiency is assumed, which depends on related determinants with a wide range of choice, via a positive parametric function. As a result, technical efficiency is constructed without relying on an assumed distribution on composite error. The model provides flexible structures on both the production frontier and inefficiency, thereby alleviating the risk of model misspecification in production and efficiency analysis. The estimator involves a series based nonlinear least squares estimation for the unknown parameters and a kernel based local estimation for the technology function. Promising finite-sample performance is demonstrated through simulations, and the model is applied to investigate productive efficiency among OECD countries from 1970–2019.

Article
Publication date: 7 November 2023

Jun Yu, Zhengcong Ma and Lin Zhu

This study aims to investigate the configurational effects of five rules – artificial intelligence (AI)-based hiring decision transparency, consistency, voice, explainability and…

407

Abstract

Purpose

This study aims to investigate the configurational effects of five rules – artificial intelligence (AI)-based hiring decision transparency, consistency, voice, explainability and human involvement – on applicants' procedural justice perception (APJP) and applicants' interactional justice perception (AIJP). In addition, this study examines whether the identified configurations could further enhance applicants' organisational commitment (OC).

Design/methodology/approach

Drawing on the justice model of applicants' reactions, the authors conducted a longitudinal survey of 254 newly recruited employees from 36 Chinese companies that utilise AI in their hiring. The authors employed fuzzy-set qualitative comparative analysis (fsQCA) to determine which configurations could improve APJP and AIJP, and the authors used propensity score matching (PSM) to analyse the effects of these configurations on OC.

Findings

The fsQCA generates three patterns involving five configurations that could improve APJP and AIJP. For pattern 1, when AI-based recruitment with high interpersonal rule (AI human involvement) aims for applicants' justice perception (AJP) through the combination of high informational rule (AI explainability) and high procedural rule (AI voice), there must be high levels of AI consistency and AI voice to complement AI explainability, and only this pattern of configurations can further enhance OC. In pattern 2, for the combination of high informational rule (AI explainability) and low procedural rule (absent AI voice), AI recruitment with high interpersonal rule (AI human involvement) should focus on AI transparency and AI explainability rather than the implementation of AI voice. In pattern 3, a mere combination of procedural rules could sufficiently improve AIJP.

Originality/value

This study, which involved real applicants, is one of the few empirical studies to explore the mechanisms behind the impact of AI hiring decisions on AJP and OC, and the findings may inform researchers and managers on how to best utilise AI to make hiring decisions.

Details

Information Technology & People, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 2 January 2023

Deepak Choudhary

As the number of devices that connect to the Internet of Things (IoT) has grown, privacy and security issues have come up. Because IoT devices collect so much sensitive…

Abstract

Purpose

As the number of devices that connect to the Internet of Things (IoT) has grown, privacy and security issues have come up. Because IoT devices collect so much sensitive information, like user names, locations, phone numbers and even how they usually use energy, it is very important to protect users' privacy and security. IoT technology will be hard to use on the client side because IoT-enabled devices do not have clear privacy and security controls.

Design/methodology/approach

IoT technology would be harder to use on the client side if the IoT did not offer enough well-defined ways to protect users’ privacy and security. The goal of this research is to protect people's privacy in the IoT by using the oppositional artificial flora optimization (EGPKC-OAFA) algorithm to generate the best keys for the ElGamal public key cryptosystem (EGPKC). The EGPKC-OAFA approach puts the most weight on the IEEE 802.15.4 standard for MAC, which is the most important part of the standard. The security field is part of the MAC header of this standard. In addition, the MAC header includes EGPKC, which makes it possible to make authentication keys as quickly as possible.

Findings

With the proliferation of IoT devices, privacy and security have become major concerns in the academic world. Security and privacy are of the utmost importance due to the large amount of personally identifiable information acquired by IoT devices, such as name, location, phone numbers and energy use. Client-side deployment of IoT technologies will be hampered by the absence of well-defined privacy and security solutions afforded by the IoT. The purpose of this research is to present the EGPKC with optimum key generation using the EGPKC-OAFA algorithm for the purpose of protecting individual privacy within the context of the IoT. The EGPKC-OAFA approach is concerned with the MAC standard defined by the IEEE 802.15.4 standard, which includes the security field in its MAC header. Also, the MAC header incorporates EGPKC, which enables the fastest possible authentication key generation. In addition, the best methodology award goes to the OAFA strategy, which successfully implements the optimum EGPKC selection strategy by combining opposition-based (OBL) and standard AFA ideas. The EGPKC-OAFA method has been proved to effectively analyze performance in a number of simulations, with the results of various functions being identified.

Originality/value

In light of the growing prevalence of the IoT, an increasing number of people are becoming anxious about the protection and confidentiality of the personal data that they save online. This is especially true in light of the fact that more and more things are becoming connected to the internet. The IoT is capable of gathering personally identifiable information such as names, addresses and phone numbers, as well as the quantity of energy that is used. It will be challenging for customers to adopt IoT technology because of worries about the security and privacy of the data generated by users. In this work, the EGPKC is paired with adversarial artificial flora, which leads in an increase to the privacy security provided by EGPKC for the IoT (EGPKC-OAFA). The MAC security field that is part of the IEEE 802.15.4 standard is one of the areas that the EGPKC-OAFA protocol places a high focus on. The Authentication Key Generation Protocol Key Agreement, also known as EGPKCA, is used in MAC headers. The abbreviation for this protocol is EGPKCA. The OAFA technique, also known as the combination of OBL and AFA, is the most successful method for selecting EGPKCs. This method is recognized by its acronym, OAFA. It has been shown via a variety of simulations that the EGPKC-OAFA technique is a very useful instrument for carrying out performance analysis.

Details

International Journal of Pervasive Computing and Communications, vol. 19 no. 5
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 28 December 2023

Johannes Hogg

The paper covers the topic of power strategies between actors and the interplay between the service ecosystem and the actor(s), and vice versa. The paper addresses the lack of…

Abstract

Purpose

The paper covers the topic of power strategies between actors and the interplay between the service ecosystem and the actor(s), and vice versa. The paper addresses the lack of conceptual development concerning power considerations beyond dyadic, rigid and role-based models found in general marketing literature. Further, the paper opens the area of power relationships, using the service ecosystem as conceptual framework.

Design/methodology/approach

The paper has a systemic and sociological view on service-ecosystems using mainly Giddens' structuration theory. Service-dominant logic literature from 2004 to 2021 is systematically reviewed for power issues and qualitatively analyzed. Mayring's step model of, firstly, inductive and, secondly, deductive category development is applied. Subcategories were identified, subsumed and finally grouped into five categories to increase the level of abstraction.

Findings

The article investigates power considerations and enables marketers to create power through (1) imbalance, to find strategies and counterstrategies for (2) actor's behavior, to understand the (3) actor's embeddedness within a service ecosystem and its dynamic nature, to learn about (4) institutions and actor's institutional work. A set of seven propositions is presented for the conceptualization of power strategies in a service ecosystem.

Research limitations/implications

The consideration of power on different levels supports both the zooming-in and zooming-out to observe and understand the power phenomena in a service ecosystem. Seven propositions about episodic as well as systemic power relations are presented. Power is conceptualized in service ecosystem as transformative capability of an actor to intervene on institutions and in some way alter them, recognizing that power relations are co-created, dynamic and context-dependent.

Practical implications

The article recognizes different levels (micro-meso-macro) of power considerations and helps practitioners and marketers to create power through (1) imbalance, find strategies and counterstrategies for (2) actor's behavior, understand the (3) actor's embeddedness within a service ecosystem and its dynamic nature, learn about (4) institutions and actor's institutional work. This enables managers to find an appropriate choice of action in their specific context to transform the service ecosystem(s) they are embedded in.

Social implications

As all social systems are power systems, a service ecosystem can only be fully understood by integrating the elementary concept of power. As such, power considerations within actor strategies and the service ecosystem are relevant to improve the understanding of transformation of the service ecosystem. Power, in the sense of the transformative capability of actors, changes the social and material world.

Originality/value

Power issues are important to understand the “hows” of resource integration in service ecosystems and its transformation or stability.

Details

Journal of Service Theory and Practice, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2055-6225

Keywords

Article
Publication date: 5 December 2023

Hui Tao, Hang Xiong, Liangzhi You and Fan Li

Smart farming technologies (SFTs) can increase yields and reduce the environmental impacts of farming by improving the efficient use of inputs. This paper is to estimate farmers'…

Abstract

Purpose

Smart farming technologies (SFTs) can increase yields and reduce the environmental impacts of farming by improving the efficient use of inputs. This paper is to estimate farmers' preference and willingness to pay (WTP) for a well-defined SFT, smart drip irrigation (SDI) technology.

Design/methodology/approach

This study conducted a discrete choice experiment (DCE) among 1,300 maize farmers in North China to understand their WTP for various functions of SDI using mixed logit (MIXL) models.

Findings

The results show that farmers have a strong preference for SDI in general and its specific functions of smart sensing and smart control. However, farmers do not have a preference for the function of region-level agronomic planning. Farmers' preferences for different functions of SDI are heterogeneous. Their preference was significantly associated with their education, experience of being village cadres and using computers, household income and holding of land and machines. Further analysis show that farmers' WTP for functions facilitated by hardware is close to the estimated prices, whereas their WTP for functions wholly or partially facilitated by software is substantially lower than the estimated prices.

Practical implications

Findings from the empirical study lead to policy implications for enhancing the design of SFTs by integrating software and hardware and optimizing agricultural extension strategies for SFTs with digital techniques such as videos.

Originality/value

This study provides initial insights into understanding farmers' preferences and WTP for specific functions of SFTs with a DCE.

Details

China Agricultural Economic Review, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1756-137X

Keywords

1 – 10 of over 3000