Search results

1 – 9 of 9
Article
Publication date: 29 February 2024

Atefeh Hemmati, Mani Zarei and Amir Masoud Rahmani

Big data challenges and opportunities on the Internet of Vehicles (IoV) have emerged as a transformative paradigm to change intelligent transportation systems. With the growth of…

Abstract

Purpose

Big data challenges and opportunities on the Internet of Vehicles (IoV) have emerged as a transformative paradigm to change intelligent transportation systems. With the growth of data-driven applications and the advances in data analysis techniques, the potential for data-adaptive innovation in IoV applications becomes an outstanding development in future IoV. Therefore, this paper aims to focus on big data in IoV and to provide an analysis of the current state of research.

Design/methodology/approach

This review paper uses a systematic literature review methodology. It conducts a thorough search of academic databases to identify relevant scientific articles. By reviewing and analyzing the primary articles found in the big data in the IoV domain, 45 research articles from 2019 to 2023 were selected for detailed analysis.

Findings

This paper discovers the main applications, use cases and primary contexts considered for big data in IoV. Next, it documents challenges, opportunities, future research directions and open issues.

Research limitations/implications

This paper is based on academic articles published from 2019 to 2023. Therefore, scientific outputs published before 2019 are omitted.

Originality/value

This paper provides a thorough analysis of big data in IoV and considers distinct research questions corresponding to big data challenges and opportunities in IoV. It also provides valuable insights for researchers and practitioners in evolving this field by examining the existing fields and future directions for big data in the IoV ecosystem.

Details

International Journal of Pervasive Computing and Communications, vol. 20 no. 2
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 1 April 2024

Tao Pang, Wenwen Xiao, Yilin Liu, Tao Wang, Jie Liu and Mingke Gao

This paper aims to study the agent learning from expert demonstration data while incorporating reinforcement learning (RL), which enables the agent to break through the…

Abstract

Purpose

This paper aims to study the agent learning from expert demonstration data while incorporating reinforcement learning (RL), which enables the agent to break through the limitations of expert demonstration data and reduces the dimensionality of the agent’s exploration space to speed up the training convergence rate.

Design/methodology/approach

Firstly, the decay weight function is set in the objective function of the agent’s training to combine both types of methods, and both RL and imitation learning (IL) are considered to guide the agent's behavior when updating the policy. Second, this study designs a coupling utilization method between the demonstration trajectory and the training experience, so that samples from both aspects can be combined during the agent’s learning process, and the utilization rate of the data and the agent’s learning speed can be improved.

Findings

The method is superior to other algorithms in terms of convergence speed and decision stability, avoiding training from scratch for reward values, and breaking through the restrictions brought by demonstration data.

Originality/value

The agent can adapt to dynamic scenes through exploration and trial-and-error mechanisms based on the experience of demonstrating trajectories. The demonstration data set used in IL and the experience samples obtained in the process of RL are coupled and used to improve the data utilization efficiency and the generalization ability of the agent.

Details

International Journal of Web Information Systems, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1744-0084

Keywords

Article
Publication date: 12 April 2024

Susan Shortland and Stephen J. Perkins

The purpose of this paper is to understand how those involved in executive pay determination in large publicly quoted UK businesses see the role of diversity within remuneration…

Abstract

Purpose

The purpose of this paper is to understand how those involved in executive pay determination in large publicly quoted UK businesses see the role of diversity within remuneration committees (Remcos) as enabling the input of different perspectives, which can enhance their decision-making and potentially improve pay outcomes.

Design/methodology/approach

Qualitative, semi-structured interviews were undertaken with 18 high-profile major-enterprise decision-makers and their advisers, i.e. non-executive directors (NEDs) serving Remcos, institutional investors, executive pay consultants and internal human resources (HR) reward specialists, together with data from three focus groups with 10 further reward management practitioners.

Findings

Remco members recognise the benefits of social category/demographic diversity but say the likelihood of increasing this is low, given talent pipeline issues. The widening of value diversity is considered problematic for Remcos’ functioning. Informational diversity is used as a proxy for social category/demographic diversity to improve Remcos’ decision-making on executive pay. While the inclusion of members from wider social networks is recognised as potentially bringing a different informational perspective, the social character of Remcos, reflecting their elite nature and experience of wealth, appears ingrained.

Originality/value

Our original contribution is to extend the application of upper echelons theory in the context of Remco decision-making to explain why members do not welcome widening informational diversity by appointing people from different social networks who lack value similarity. Instead, by drawing views from employees, HR acts as a proxy for social network informational diversity. The elite, upper-echelons nature of Remco appointments remains unchanged and team functioning is not disrupted.

Details

Equality, Diversity and Inclusion: An International Journal, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2040-7149

Keywords

Book part
Publication date: 10 April 2024

Ifzal Ahmad and M. Rezaul Islam

In this final chapter, we explore the ever-evolving 21st century landscape where ethics drive community development toward resilience and progress. Drawing inspiration from the…

Abstract

In this final chapter, we explore the ever-evolving 21st century landscape where ethics drive community development toward resilience and progress. Drawing inspiration from the subheadings mapping our journey, we traverse international case studies spanning Canada, Brazil, Sweden, Kenya, China, Australia, Antarctica, and India. Through these global insights, we uncover the impacts of dynamic forces on communities worldwide, navigating ethical dilemmas and opportunities. We present strategies tailored to diverse continent-specific needs, explore inclusive governance models, and highlight the transformative power of ethical engagement. This journey underscores the vital role of resilience and concludes with a global call to embrace ethical approaches for inclusive community development and a sustainable future.

Details

Building Strong Communities: Ethical Approaches to Inclusive Development
Type: Book
ISBN: 978-1-83549-175-1

Keywords

Open Access
Article
Publication date: 5 October 2023

Peter Dornheim and Ruediger Zarnekow

The human factor is the most important defense asset against cyberattacks. To ensure that the human factor stays strong, a cybersecurity culture must be established and cultivated…

1033

Abstract

Purpose

The human factor is the most important defense asset against cyberattacks. To ensure that the human factor stays strong, a cybersecurity culture must be established and cultivated in a company to guide the attitudes and behaviors of employees. Many cybersecurity culture frameworks exist; however, their practical application is difficult. This paper aims to demonstrate how an established framework can be applied to determine and improve the cybersecurity culture of a company.

Design/methodology/approach

Two surveys were conducted within eight months in the internal IT department of a global software company to analyze the cybersecurity culture and the applied improvement measures. Both surveys comprised the same 23 questions to measure cybersecurity culture according to six dimensions: cybersecurity accountability, cybersecurity commitment, cybersecurity necessity and importance, cybersecurity policy effectiveness, information usage perception and management buy-in.

Findings

Results demonstrate that cybersecurity culture maturity can be determined and improved if accurate measures are derived from the results of the survey. The first survey showed potential for improving the dimensions of cybersecurity accountability, cybersecurity commitment and cybersecurity policy effectiveness, while the second survey proved that these dimensions have been improved.

Originality/value

This paper proves that practical application of cybersecurity culture frameworks is possible if they are appropriately tailored to a given organization. In this regard, scientific research and practical application combine to offer real value to researchers and cybersecurity executives.

Details

Information & Computer Security, vol. 32 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 12 April 2024

Youwei Li and Jian Qu

The purpose of this research is to achieve multi-task autonomous driving by adjusting the network architecture of the model. Meanwhile, after achieving multi-task autonomous…

Abstract

Purpose

The purpose of this research is to achieve multi-task autonomous driving by adjusting the network architecture of the model. Meanwhile, after achieving multi-task autonomous driving, the authors found that the trained neural network model performs poorly in untrained scenarios. Therefore, the authors proposed to improve the transfer efficiency of the model for new scenarios through transfer learning.

Design/methodology/approach

First, the authors achieved multi-task autonomous driving by training a model combining convolutional neural network and different structured long short-term memory (LSTM) layers. Second, the authors achieved fast transfer of neural network models in new scenarios by cross-model transfer learning. Finally, the authors combined data collection and data labeling to improve the efficiency of deep learning. Furthermore, the authors verified that the model has good robustness through light and shadow test.

Findings

This research achieved road tracking, real-time acceleration–deceleration, obstacle avoidance and left/right sign recognition. The model proposed by the authors (UniBiCLSTM) outperforms the existing models tested with model cars in terms of autonomous driving performance. Furthermore, the CMTL-UniBiCL-RL model trained by the authors through cross-model transfer learning improves the efficiency of model adaptation to new scenarios. Meanwhile, this research proposed an automatic data annotation method, which can save 1/4 of the time for deep learning.

Originality/value

This research provided novel solutions in the achievement of multi-task autonomous driving and neural network model scenario for transfer learning. The experiment was achieved on a single camera with an embedded chip and a scale model car, which is expected to simplify the hardware for autonomous driving.

Details

Data Technologies and Applications, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2514-9288

Keywords

Article
Publication date: 16 April 2024

Ihor Rudko, Aysan Bashirpour Bonab, Maria Fedele and Anna Vittoria Formisano

This study, a theoretical article, aims to introduce new institutionalism as a framework through which business and management researchers can explore the significance of…

Abstract

Purpose

This study, a theoretical article, aims to introduce new institutionalism as a framework through which business and management researchers can explore the significance of artificial intelligence (AI) in organizations. Although the new institutional theory is a fully established research program, the neo-institutional literature on AI is almost non-existent. There is, therefore, a need to develop a deeper understanding of AI as both the product of institutional forces and as an institutional force in its own right.

Design/methodology/approach

The authors follow the top-down approach. Accordingly, the authors first briefly describe the new institutionalism, trace its historical development and introduce its fundamental concepts: institutional legitimacy, environment and isomorphism. Then, the authors use those as the basis for the queries to perform a scoping review on the institutional role of AI in organizations.

Findings

The findings reveal that a comprehensive theory on AI is largely absent from business and management literature. The new institutionalism is only one of many possible theoretical perspectives (both contextually novel and insightful) from which researchers can study AI in organizational settings.

Originality/value

The authors use the insights from new institutionalism to illustrate how a particular social theory can fit into the larger theoretical framework for AI in organizations. The authors also formulate four broad research questions to guide researchers interested in studying the institutional significance of AI. Finally, the authors include a section providing concrete examples of how to study AI-related institutional dynamics in business and management.

Details

Journal of Management History, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1751-1348

Keywords

Article
Publication date: 26 January 2024

Yuanzhang Yang, Linqin Wang, Shengxiang Gao, Zhengtao Yu and Ling Dong

This paper aims to disentangle Chinese-English-rich resources linguistic and speaker timbre features, achieving cross-lingual speaker transfer for Cambodian.

Abstract

Purpose

This paper aims to disentangle Chinese-English-rich resources linguistic and speaker timbre features, achieving cross-lingual speaker transfer for Cambodian.

Design/methodology/approach

This study introduces a novel approach: the construction of a cross-lingual feature disentangler coupled with the integration of time-frequency attention adaptive normalization to proficiently convert Cambodian speaker timbre into Chinese-English without altering the underlying Cambodian speech content.

Findings

Considering the limited availability of multi-speaker corpora in Cambodia, conventional methods have demonstrated subpar performance in Cambodian speaker voice transfer.

Originality/value

The originality of this study lies in the effectiveness of the disentanglement process and precise control over speaker timbre feature transfer.

Details

International Journal of Web Information Systems, vol. 20 no. 2
Type: Research Article
ISSN: 1744-0084

Keywords

Article
Publication date: 23 November 2022

Hamfrey Sanhokwe

Exposure to a public health threat of significant proportions made current models inadequate to explain the failure phenomenon in small businesses. Hence, the need to reimagine…

Abstract

Purpose

Exposure to a public health threat of significant proportions made current models inadequate to explain the failure phenomenon in small businesses. Hence, the need to reimagine the phenomenon. Borrowing from the principles of biology, this study extended theoretical and empirical perspectives on the failure phenomenon by unpacking its constituent elements and the measurement metrics using the regeneration lens.

Design/methodology/approach

Based on a cohort tracked over time, the study estimated the survival probabilities of small and medium-scale enterprises (SMEs) with and without regeneration using the Kaplan–Meier method. The study investigated the factors that predict enterprise regenerative capacity using the multivariate Cox proportional hazard ratios.

Findings

Rates of interruption in business activity, by month, ranged between 0% and 18% during the follow-up period. True mortality rates hovered between 0% and 4% over the same period. Over three in five SMEs that experienced interruption in business activity without ceasing operations regenerated at some point in time during the follow-up period. The survival probabilities beyond the follow-up period were 0.85 and 0.44 with and without regeneration effects, respectively. Fresh capital injection (+), the introduction of new/improved processes or products/services (+), perceived business outlook (+) and the presence of debt (−) influenced the capacity to regenerate.

Research limitations/implications

The cohort was followed for only six months. There is a need to continue interrogating the failure phenomenon in other contexts over longer periods using the regeneration lens. Bringing on board academia, financial institutions and other SME-related ecosystem players will be strategic.

Practical implications

The approach provides a more nuanced understanding of the life and well-being of enterprises under conditions of disruption. Improving the precision and validity of failure-related statistics enhances their utility in policy and remediation-related discussions.

Social implications

The results did not show significant differences in SME mortality rates between male and female-owned enterprises. The results provide further evidence that the failure phenomenon is ungendered. As such, financial institutions and the SME ecosystem at large must eliminate perceptual gender biases in the financing and other support to SMEs.

Originality/value

The study used the principles of biology to reimagine the failure phenomenon in small businesses. The approach breathes life into entrepreneurship research and policy.

Details

Journal of Entrepreneurship in Emerging Economies, vol. 16 no. 3
Type: Research Article
ISSN: 2053-4604

Keywords

1 – 9 of 9