Search results

1 – 10 of over 1000
Open Access
Article
Publication date: 14 August 2017

Jose Ignacio Tamayo Segarra, Bilal Al Jammal and Hakima Chaouchi

Internet of Things’ (IoT’s) first wave started with tracking services for better inventory management mainly using radio frequency identification (RFID) technology. Later on…

2879

Abstract

Purpose

Internet of Things’ (IoT’s) first wave started with tracking services for better inventory management mainly using radio frequency identification (RFID) technology. Later on, monitoring services became one of the major interests, including sensing technologies, and then more actuation for remote control-type of IoT applications such as smart homes, smart cities and Industry 4.0. In this paper, the authors focus on the RFID technology impairment. They propose to take advantage of the mature IoT technologies that offer native service discovery such as blutooth or LTE D2D ProSe or Wifi Direct. Using the automatic service discovery in the new framework will make heterogeneous readers aware of the presence of other readers and this will be used by the proposed distributed algorithm to better control the multiple RFID reader interference problem. The author clearly considers emerging Industry 4.0 use case, where RFID technology is of major interest for both identification and tracking. To enhance the RFID tag reading performance, collisions in the RFID frequency should be minimized with reader-to-reader coordination protocols. In this paper, the author proposes a simple distributed reader anti-collision protocol named DiSim that makes use of proximity services of IoT network and is compliant with the current RFID standards. The author evaluates the efficiency of the proposal via simulation.

Design/methodology/approach

In this paper, the author proposes a simple distributed reader anti-collision protocol named DiSim that makes use of proximity services of IoT network and is compliant with the current RFID standards. The author evaluates the efficiency of the proposal via simulation to study its behavior in very dense and heterogeneous RFID environments. Specifically, the author explores the coexistence of powerful static readers and small mobile readers, comparing the proposal with a standard ETSI CSMA method. The proposal reduces significantly the number of access attempts, which are resource-expensive for the readers. The results show that the objectives of DiSim are met, producing low reader collision probability and, however, having lower average readings per reader per time.

Findings

DiSim is evaluated with the ETSI standard LBT protocol for multi-reader environments in several environments with varied levels of reader and tag densities, having both static powerful RFID readers and heterogeneous randomly moving mobile RFID readers. It effectively reduces the number of backoffs or contentions for the RFID channel. This has high reading success rate due to the avoided collisions; however, the readers are put to wait, and DiSim has less average readings per reader per time. As an additional side evaluation, the ETSI standard LBT mechanism was found to present a good performance for low-density mid-coverage scenarios, however, with high variability on the evaluation results.

Research limitations/implications

To show more results, the author needs to do real experimentation in a warehouse, such as Amazon warehouse, where he expects to have more and more robots, start shelves, automatic item finding on the shelve, etc.

Practical implications

Future work considers experimentation in a real warehouse equipped with heterogeneous RFID readers and real-time analysis of RFID reading efficiency also combined with indoor localization and navigation for warehouse mobile robots.

Social implications

More automatization is expected in the future; this work makes the use of RFID technology more efficient and opens more possibilities for services deployment in different domains such as the industry which was considered not only in this paper but also in smart cites and smart homes.

Originality/value

Compared to the literature, the proposal offers the advantage to not be dependent on a centralized server controlling the RFID readers. It also offers the possibility for an existing RFID architecture to add new readers from a different manufacturer, as the readers using the approach will have the possibility to discover the capabilities of the new interaction other RFID readers. This solution takes advantage of the available proximity service that will be more and more offered by the IoT technologies.

Open Access
Book part
Publication date: 1 October 2018

Susanne Sackl-Sharif, Eva Goldgruber, Julian Ausserhofer, Robert Gutounig and Gudrun Reimerth

The 2013 Central European floods were not only one of the most severe natural disasters in Austria in the last decades, but also constituted a landmark in crisis communication

Abstract

The 2013 Central European floods were not only one of the most severe natural disasters in Austria in the last decades, but also constituted a landmark in crisis communication. For the first time, social media and online newspapers were important news channels, creating a need for new crisis communication strategies. Based on 20 semi-structured interviews and an analysis of online data, we reconstruct in this chapter the online communication of different stakeholders such as the authorities, rescue organisations and journalists during this emergency situation. The study shows that the use of social media was a weak point in official crisis communication. Through detailed analyses of information flows and the requirements of different stakeholders, the study reveals new challenges and possibilities for crisis communication in the digital age.

Open Access
Article
Publication date: 25 January 2023

Elina Lassila, Eija-Liisa Heikka and Satu Nätti

The purpose of this study is to examine the role of interaction in supporting value co-creation during pre-purchase customer journey stages when selling professional B-to-B…

1833

Abstract

Purpose

The purpose of this study is to examine the role of interaction in supporting value co-creation during pre-purchase customer journey stages when selling professional B-to-B services. First, value co-creation in professional service firms (PSFs) is reviewed, and, second, the role of interaction in the different stages of a customer’s pre-purchase journey is explored, specifically in the context of B-to-B human resource management services.

Design/methodology/approach

Qualitative, semi-structured interview data was collected from potential B2B customers of a PSF in question, providing a broad coverage of prospective clients in architecture, engineering and IT sector.

Findings

In general, the findings of this study indicate that interaction plays a crucial role in pre-purchasing stages of a customer journey. In particular, these findings form understanding of how various interaction channels and content support PSF’s ability to co-create value with its prospects.

Originality/value

The existing research tends to concentrate on how value is created for existing customers, and far less attention has been paid to the perspective of prospects. This study contributes theoretically by providing novel insights into the current literature on value co-creation in PSFs by providing an understanding of how interactions in pre-purchase phases affect the co-creation of value from the perspective of prospects, which is a less researched viewpoint. Empirically, this study offers managers much-needed, context-specific knowledge of PSFs by comparing differences and pulling together similarities from each customer journey stage of PSF prospects.

Details

Journal of Business & Industrial Marketing, vol. 38 no. 13
Type: Research Article
ISSN: 0885-8624

Keywords

Open Access
Article
Publication date: 10 March 2022

Ivan Paunovic, Nóra Obermayer and Edit Kovari

Both Hungary and Germany belong to the old-world wine-producing countries and have long winemaking traditions. This paper aims at exploring and comparing online branding…

2178

Abstract

Purpose

Both Hungary and Germany belong to the old-world wine-producing countries and have long winemaking traditions. This paper aims at exploring and comparing online branding strategies of family SME (small and medium sized enterprises) wineries at Lake Balaton (Hungary) and Lake Constance (Germany), as two wine regions with similar geographic characteristics.

Design/methodology/approach

This paper, based on a total sample of 37 family wineries, 15 at Lake Balaton and 22 at Lake Constance, investigates the differences in brand identity on the website, brand image in social media and online communication channels deployed in both wine regions. The study applies a qualitative methodology using MaxQDA software for conducting content analysis of texts in websites and social media. Descriptive statistics and t-test were conducted to compare the usage of different communication channels and determine statistical significance.

Findings

At Lake Balaton, the vineyard, the winery and the family, while at Lake Constance, the lake itself and the grape are highlighted regarding family winery brand identity. The customer-based brand image of Hungarian family wineries emphasizes wine, food and service, with the predominant use of Facebook. In the German family wineries, the focus of brand identity is on wine, friendliness and taste and includes more extensive usage of websites.

Originality/value

The paper deploys a novel methodology, both in terms of tools used as well as geographic focus to uncover online branding patterns of family wineries, thereby providing implications for wine and tourism industries at lake regions. It compares the share of selected most-used words in the overall text in websites and in social media, and presents the key findings from this innovative approach.

Details

Journal of Family Business Management, vol. 12 no. 3
Type: Research Article
ISSN: 2043-6238

Keywords

Open Access
Article
Publication date: 28 February 2023

Taina Erkkilä and Vilma Luoma-aho

During the COVID-19 pandemic, public sector organisations produced thousands of social media messages weekly answering citizens questions and informing the public on safety…

1172

Abstract

Purpose

During the COVID-19 pandemic, public sector organisations produced thousands of social media messages weekly answering citizens questions and informing the public on safety related matters. The purpose of this study was to investigate how the pandemic shaped social media listening in Finland's public sector organisations and how these organisations aligned their listening and strategic communication to address emerging questions, news (real and fake) and rumours during the pandemic.

Design/methodology/approach

Building on a theoretical background from strategic communication, organisational listening, digital marketing and public sector communication, qualitative interview data included communicators (N = 14) from all central Finnish public sector organisations in charge of COVID-19 communication. Findings were themed and analysed qualitatively to understand the level of alignment of strategic communication on social media.

Findings

The findings revealed that the pandemic had strained public sector organisations' communication capabilities, forcing them to align their processes and resources reactively to enable useful content and limit false/misleading content. The results confirmed that organisational listening remained somewhat unaligned. A dual role of public sector communication as speakers but increasingly as listeners was highlighted.

Originality/value

The study’s findings point to organisational listening on social media being a central requisite for public sector organisations overcoming a crisis.

Details

Journal of Communication Management, vol. 27 no. 1
Type: Research Article
ISSN: 1363-254X

Keywords

Open Access
Article
Publication date: 31 March 2023

Yong Chen, Zhixian Zhan and Wei Zhang

As the strategy of 5G new infrastructure is deployed and advanced, 5G-R becomes the primary technical system for future mobile communication of China’s railway. V2V communication

Abstract

Purpose

As the strategy of 5G new infrastructure is deployed and advanced, 5G-R becomes the primary technical system for future mobile communication of China’s railway. V2V communication is also an important application scenario of 5G communication systems on high-speed railways, so time synchronization between vehicles is critical for train control systems to be real-time and safe. How to improve the time synchronization performance in V2V communication is crucial to ensure the operational safety and efficiency of high-speed railways.

Design/methodology/approach

This paper proposed a time synchronization method based on model predictive control (MPC) for V2V communication. Firstly, a synchronous clock for V2V communication was modeled based on the fifth generation mobile communication-railway (5G-R) system. Secondly, an observation equation was introduced according to the phase and frequency offsets between synchronous clocks of two adjacent vehicles to construct an MPC-based space model of clock states of the adjacent vehicles. Finally, the optimal clock offset was solved through multistep prediction, rolling optimization and other control methods, and time synchronization in different V2V communication scenarios based on the 5G-R system was realized through negative feedback correction.

Findings

The results of simulation tests conducted with and without a repeater, respectively, show that the proposed method can realize time synchronization of V2V communication in both scenarios. Compared with other methods, the proposed method has faster convergence speed and higher synchronization precision regardless of whether there is a repeater or not.

Originality/value

This paper proposed an MPC-based time synchronization method for V2V communication under 5G-R. Through the construction of MPC controllers for clocks of adjacent vehicles, time synchronization was realized for V2V communication under 5G-R by using control means such as multistep prediction, rolling optimization, and feedback correction. In view of the problems of low synchronization precision and slow convergence speed caused by packet loss with existing synchronization methods, the observer equation was introduced to estimate the clock state of the adjacent vehicles in case of packet loss, which reduces the impact of clock error caused by packet loss in the synchronization process and improves the synchronization precision of V2V communication. The research results provide some theoretical references for V2V synchronous wireless communication under 5G-R technology.

Details

Railway Sciences, vol. 2 no. 1
Type: Research Article
ISSN: 2755-0907

Keywords

Open Access
Article
Publication date: 22 August 2023

Daniella Fjellström, Ehsanul Huda Chowdhury, Sohail Ahmad and Bolortuya Batkhuu

This study aims to understand the role of drivers, underlying challenges and, consequently, the implications of the reverse knowledge transfer (RKT) process for the multinational…

Abstract

Purpose

This study aims to understand the role of drivers, underlying challenges and, consequently, the implications of the reverse knowledge transfer (RKT) process for the multinational enterprises (MNE)s.

Design/methodology/approach

A dyadic qualitative research design was used with a cross-country design covering perspectives from both the headquarters and subsidiaries from the USA, Denmark, Pakistan, India and Bangladesh. In-depth interviews were conducted with managers in multiple sectors such as information technology, telecommunications, project management and engineering.

Findings

The study reveals the constraints and drivers of the RKT process, and furthermore elaborates on the implications for MNEs. RKT can lead to the development of new processes, subsidiary independence and intra-organizational knowledge transfer. Besides, it can entail challenges such as position insecurity for subsidiaries and a blurring of the MNE market vision. The findings demonstrate several implications for the MNEs.

Practical implications

The study highlights the direct implications of RKT for the multinational enterprises. The findings serve as a practical guide for global managers seeking to improve their competitive edge.

Originality/value

The study presents a framework of the RKT process from emerging market subsidiaries to parent companies, that demonstrates the role of drivers, underlying challenges and implications of the RKT process for the MNEs.

Details

Central European Management Journal, vol. 31 no. 3
Type: Research Article
ISSN: 2658-0845

Keywords

Open Access
Article
Publication date: 27 April 2020

Kaisa Laitinen and Anu Sivunen

The purpose of this study is to investigate the various enablers of and constraints on employees' information sharing on an enterprise social media platform. It draws on two…

6806

Abstract

Purpose

The purpose of this study is to investigate the various enablers of and constraints on employees' information sharing on an enterprise social media platform. It draws on two theoretical perspectives, communication privacy management theory and the technology affordance framework, as well as on empirical data in an attempt to paint a comprehensive picture of the factors shaping employees' decisions to share or not share information on enterprise social media.

Design/methodology/approach

This qualitative field study is based on semi-structured interviews and enterprise social media review data from a large Nordic media organization.

Findings

On an enterprise social media platform, privacy management principles shape employees' information-sharing decisions in relation to personal privacy boundaries, professional boundaries and assumed risks, online safety concerns and perceived audience. Additionally, the technological affordances of visibility, awareness, persistence and searchability shape employees' information sharing in varying and sometimes even contradictory ways. Finally, organizational factors, such as norms, tasks and media repertoires, are associated with employees' information-sharing decisions. Together, these three dimensions, personal, technological and organizational, form a model of the enablers of and constraints on employees' decisions to share information on enterprise social media.

Originality/value

This study extends the understanding of different factors shaping employees' decisions to share or not share information on enterprise social media. It extends the two applied theories by uniquely combining interpersonal privacy management principles with a technological affordance framework that focuses on the relationship between the user and the technology. This research also furthers the authors' knowledge of what privacy management principles mean in the organizational context. This study shows connections between the two theories and extends the understanding of technology affordances as not only action possibilities but also constraining factors. Additionally, by revealing what kinds of factors encourage and inhibit information sharing on enterprise social media, the results of this study support organizations in their efforts to manage information sharing on enterprise social media systems.

Details

Information Technology & People, vol. 34 no. 2
Type: Research Article
ISSN: 0959-3845

Keywords

Open Access
Book part
Publication date: 1 October 2018

Harald Hornmoen and Per Helge Måseide

The chapter addresses the question of how crisis and emergency communicators in the justice (police) and health sector in Norway reflect on their use – or lack of use – of social…

Abstract

The chapter addresses the question of how crisis and emergency communicators in the justice (police) and health sector in Norway reflect on their use – or lack of use – of social media during the terror crisis on 22 July 2011. We examine how these communicators in the years following the crisis have developed their use of social media to optimise their and the public’s awareness of similar crises. Our semi-structured interviews with key emergency managers and responders display how the terrorist-induced crisis in 2011 was a wake-up call for communicators in the police and the health sector. They reflect on the significance, strengths and weaknesses of social media in the management of crises such as this one.

Details

Social Media Use in Crisis and Risk Communication
Type: Book
ISBN: 978-1-78756-269-1

Keywords

Open Access
Article
Publication date: 15 July 2022

Xuwei Jin, Shize Huang, Xiaowen Liu, Jing Zhou, Jinzhe Qin, Decun Dong and Xingying Li

Electromagnetic interference (EMI) on communication systems of unban rail transit can hardly be clarified because of complicated factors around railways. This paper aims to target…

Abstract

Purpose

Electromagnetic interference (EMI) on communication systems of unban rail transit can hardly be clarified because of complicated factors around railways. This paper aims to target this issue and extend experimental and theoretical analysis.

Design/methodology/approach

This paper take the Nanjing Dashengguan Bridge as an example, because it carries the most tracks in the world and bears three kinds of trains running through, providing a perfect complex environment. First, it investigates the three communication systems, terrestrial trunked radio, communications-based train control (CBTC) and passenger information system (PIS) that Nanjing Metro uses, and select appropriate devices accordingly. Second, it establishes a system level platform and conduct three tests to analyze their respective operating principles and performance difference under common electromagnetic environments. Third, it adopts theoretical formula to verify test results.

Findings

The experiment results and theoretical analysis mutually corroborate each other and present practical recommendations: an 8 m or more distance between two tracks will ensure no obvious EMI created by a passing train on communication systems; two certain communication systems should not share the same frequency band; interference level is more related to field strength than weathers and building materials; and CBTC DSSS waveguide mode as well as PIS LTE mode are preferred.

Originality/value

This research also provides a practical method of investigating EMI for other complex situations.

Details

Smart and Resilient Transport, vol. 4 no. 2
Type: Research Article
ISSN: 2632-0487

Keywords

1 – 10 of over 1000