Search results
1 – 10 of 866Yueting Chai, Chunyan Miao, Baowen Sun, Yongqing Zheng and Qingzhong Li
The synthetic application and interaction of/between the internet, Internet of Things, cloud computing, big data, Industry 4.0 and other new patterns and new technologies shall…
Abstract
Purpose
The synthetic application and interaction of/between the internet, Internet of Things, cloud computing, big data, Industry 4.0 and other new patterns and new technologies shall breed future Web-based industrial operation system and social operation management patterns, manifesting as a crowd cyber eco-system composed of multiple interconnected intelligent agents (enterprises, individuals and governmental agencies) and its dynamic behaviors. This paper aims to explore the basic principles and laws of such a system and its behavior.
Design/methodology/approach
The authors propose the concepts of crowd science and engineering (CSE) and expound its main content, thus forming a research framework of theories and methodologies of crowd science.
Findings
CSE is expected to substantially promote the formation and development of crowd science and thus lay a foundation for the advancement of Web-based industrial operation system and social operation management patterns.
Originality/value
This paper is the first one to propose the concepts of CSE, which lights the beacon for the future research in this area.
Details
Keywords
This study aims to review the literature on sharing economy logistics and crowd logistics to answer the three following questions: How is the literature on sharing economy…
Abstract
Purpose
This study aims to review the literature on sharing economy logistics and crowd logistics to answer the three following questions: How is the literature on sharing economy logistics structured? What are the main trends in sharing economy logistics and crowd logistics? What are the future research options?
Design/methodology/approach
Bibliometric analysis is used to evaluate 85 articles published over the past 12 years; it identifies the top academic journals, authors and research topics contributing to the field.
Findings
The sharing economy logistics and crowd logistics literature is structured around several disciplines and highlights that some are more scientifically advanced than others in their subject definitions, designs, modelling and innovative solutions. The main trends are organized around three clusters: Cluster 1 refers to the optimal allocation of costs, prices, distribution and supplier relationships; Cluster 2 corresponds to business related crowdsourcing and international industry practices; and Cluster 3 includes the impact of transport on last-mile delivery, crowd shipping and the environment.
Research limitations/implications
The study is based on data from peer-reviewed scientific journals and conferences. A broader overview could include other data sources such as books, book chapters, working papers, etc.
Originality/value
Future research directions are discussed in the context of the evolution from crowd logistics to crowd intelligence, and the complexities of crowd logistics such as understanding how the social crowd can be integrated into the logistics process. Our results are part of the crowd science and engineering concept and provide some answers about crowd cyber-system questions regarding crowd intelligence in logistic sector.
Details
Keywords
Yiqiang Feng, Leiju Qiu and Baowen Sun
The originality of the crowd cyber system lies in the fact that it possesses the intelligence of multiple groups including intelligence of people, intelligence of objects and…
Abstract
Purpose
The originality of the crowd cyber system lies in the fact that it possesses the intelligence of multiple groups including intelligence of people, intelligence of objects and intelligence of machines. However, quantitative analysis of the level of intelligence is not sufficient, due to many limitations, such as the unclear definition of intelligence and the inconformity of human intelligence quotient (IQ) test and artificial intelligence assessment methods. This paper aims to propose a new crowd intelligence measurement framework from the harmony of adaption and practice to measure intelligence in crowd network.
Design/methodology/approach
The authors draw on the ideas of traditional Confucianism, which sees intelligence from the dimensions of IQ and effectiveness. First, they clarify the related concepts of intelligence and give a new definition of crowd intelligence in the form of a set. Second, they propose four stages of the evolution of intelligence from low to high, and sort out the dilemma of intelligence measurement at the present stage. Third, they propose a framework for measuring crowd intelligence based on two dimensions.
Findings
The generalized IQ operator model is optimized, and a new IQ algorithm is proposed. Individuals with different IQs can have different relationships, such as cooperative, competitive, antagonistic and so on. The authors point out four representative forms of intelligence as well as its evolution stages.
Research limitations/implications
The authors, will use more rigorous mathematical symbols to represent the logical relationships between different individuals, and consider applying the measurement framework to a real-life situation to enrich the research on crowd intelligence in the further study.
Originality/value
Intelligence measurement is one of foundations of crowd science. This research lays the foundation for studying the interaction among human, machine and things from the perspective of crowd intelligence, which owns significant scientific value.
Details
Keywords
Yuejiang Li, H. Vicky Zhao and Yan Chen
With the popularity of the internet and the increasing numbers of netizens, tremendous information flows are generated daily by the intelligently interconnected individuals. The…
Abstract
Purpose
With the popularity of the internet and the increasing numbers of netizens, tremendous information flows are generated daily by the intelligently interconnected individuals. The diffusion processes of different information are not independent, and they interact with and influence each other. Modeling and analyzing the interaction between correlated information play an important role in the understanding of the characteristics of information dissemination and better control of the information flows. This paper aims to model the correlated information diffusion process over the crowd intelligence networks.
Design/methodology/approach
This study extends the classic epidemic susceptible–infectious–recovered (SIR) model and proposes the SIR mixture model to describe the diffusion process of two correlated pieces of information. The whole crowd is divided into different groups with respect to their forwarding state of the correlated information, and the transition rate between different groups shows the property of each piece of information and the influences between them.
Findings
The stable state of the SIR mixture model is analyzed through the linearization of the model, and the stable condition can be obtained. Real data are used to validate the SIR mixture model, and the detailed diffusion process of correlated information can be inferred by the analysis of the parameters learned through fitting the real data into the SIR mixture model.
Originality/value
The proposed SIR mixture model can be used to model the diffusion of correlated information and analyze the propagation process.
Details
Keywords
Shipeng Wang, Lizhen Cui, Lei Liu, Xudong Lu and Qingzhong Li
The purpose of this paper is to build cyber-physical-psychological ternary fusion crowd intelligence network and realize comprehensive, real, correct and synchronous projection in…
Abstract
Purpose
The purpose of this paper is to build cyber-physical-psychological ternary fusion crowd intelligence network and realize comprehensive, real, correct and synchronous projection in cyber–physical–psychological ternary fusion system. Since the network of crowd intelligence is the future interconnected network system that takes on the features of large scale, openness and self-organization. The Digital-selfs in the network of crowd intelligence interact and cooperate with each other to finish transactions and achieve co-evolution eventually.
Design/methodology/approach
To realize comprehensive, real, correct and synchronous projection between cyber–physical–psychological ternary fusion system, the authors propose the rules and methods of projection from real world to the CrowdIntell Network. They build the mental model of the Digital-self including structure model and behavior model in four aspects: identity, provision, demand and connection, thus forming a theoretical mental model framework of Digital-self.
Findings
The mental model is excepted to lay a foundation for the theory of modeling and simulation in the research of crowd science and engineering.
Originality/value
This paper is the first one to propose the mental model framework and projection rules and methods of Digital-selfs in network of crowd intelligence, which lays a solid foundation for the theory of modeling, simulation, intelligent transactions, evolution and stability of CrowdIntell Network system, thus promoting the development of crowd science and engineering.
Details
Keywords
Takayuki Ito, Takanobu Otsuka, Satoshi Kawase, Akihisa Sengoku, Shun Shiramatsu, Takanori Ito, Eizo Hideshima, Tokuro Matsuo, Tetsuya Oishi, Rieko Fujita, Naoki Fukuta and Katsuhide Fujita
This paper aims to present a preliminary experimental result on a large-scale experiment on a cyber-physical hybrid discussion support environment in a panel discussion session in…
Abstract
Purpose
This paper aims to present a preliminary experimental result on a large-scale experiment on a cyber-physical hybrid discussion support environment in a panel discussion session in an international conference.
Design/methodology/approach
In this paper, the authors propose a hybrid (cyber-physical) environment in which people can discuss online and also offline simultaneously. The authors conducted a large-scale experiment in a panel discussion session in an international conference where participants can discuss by using their online discussion support system and by physical communications as usual.
Findings
The authors analyzed the obtained date from the following three viewpoints: participants’ cyber-physical attention, keywords cyber-physical linkage and cyber-physical discussion flow. These three viewpoints indicate that the methodology of the authors can be effective to support hybrid large-scale discussions.
Originality/value
Online large-scale discussion has been focused as a new methodology that enable people to discuss, argue and make consensus in terms of political issues, social complex problems (like climate change), city planning and so on. In several cases, the authors found that online discussions are very effective to gather people opinions and discussions so far. Moreover, this paper proposes a hybrid (cyber-physical) environment in which people can discuss online and also offline simultaneously.
Details
Keywords
Mohammad Moradi and Qi Li
Over the past decade, many research works in various disciplines have benefited from the endless ocean of people and their potentials (in the form of crowdsourcing) as an…
Abstract
Purpose
Over the past decade, many research works in various disciplines have benefited from the endless ocean of people and their potentials (in the form of crowdsourcing) as an effective problem-solving strategy and computational model. But nothing interesting is ever completely one-sided. Therefore, when it comes to leveraging people's power, as the dark side of crowdsourcing, there are some possible threats that have not been considered as should be, such as recruiting black hat crowdworkers for organizing targeted adversarial intentions. The purpose of this paper is to draw more attention to this critical issue through investigation of its different aspects.
Design/methodology/approach
To delve into details of such malicious intentions, the related literature and previous researches have been studied. Then, four major typologies for adversarial crowdsourced attacks as well as some real-world scenarios are discussed and delineated. Finally, possible future threats are introduced.
Findings
Despite many works on adversarial crowdsourcing, there are only a few specific research studies devoted to considering the issue in the context of cyber security. In this regard, the proposed typologies (and addressed scenarios) for such human-mediated attacks can shed light on the way of identifying and confronting such threats.
Originality/value
To the best of the authors' knowledge, this the first work in which the titular topic is investigated in detail. Due to popularity and efficiency of leveraging crowds' intelligence and efforts in a wide range of application domains, it is most likely that adversarial human-driven intentions gain more attention. In this regard, it is anticipated that the present research study can serve as a roadmap for proposing defensive mechanisms to cope with such diverse threats.
Details
Keywords
Abhijeet Ghadge, Maximilian Weiß, Nigel D. Caldwell and Richard Wilding
In spite of growing research interest in cyber security, inter-firm based cyber risk studies are rare. Therefore, this study aims to investigate cyber risk management in supply…
Abstract
Purpose
In spite of growing research interest in cyber security, inter-firm based cyber risk studies are rare. Therefore, this study aims to investigate cyber risk management in supply chain contexts.
Design/methodology/approach
Adapting a systematic literature review process, papers from interdisciplinary areas published between 1990 and 2017 were selected. Different typologies, developed for conducting descriptive and thematic analysis, were established using data mining techniques to conduct a comprehensive, replicable and transparent review.
Findings
The review identifies multiple future research directions for cyber security/resilience in supply chains. A conceptual model is developed, which indicates a strong link between information technology, organisational and supply chain security systems. The human/behavioural elements within cyber security risk are found to be critical; however, behavioural risks have attracted less attention because of a perceived bias towards technical (data, application and network) risks. There is a need for raising risk awareness, standardised policies, collaborative strategies and empirical models for creating supply chain cyber-resilience.
Research limitations/implications
Different types of cyber risks and their points of penetration, propagation levels, consequences and mitigation measures are identified. The conceptual model developed in this study drives an agenda for future research on supply chain cyber security/resilience.
Practical implications
A multi-perspective, systematic study provides a holistic guide for practitioners in understanding cyber-physical systems. The cyber risk challenges and the mitigation strategies identified support supply chain managers in making informed decisions.
Originality/value
To the best of the authors’ knowledge, this is the first systematic literature review on managing cyber risks in supply chains. The review defines supply chain cyber risk and develops a conceptual model for supply chain cyber security systems and an agenda for future studies.
Details
Keywords
Fatima M. Isiaka, Salihu Abdullahi Audu and Mustafa Ahmed Umar
The dependence on the use of information systems for nearly every activity and functions in the internet is increasingly high. This form of interconnectedness has bolstered…
Abstract
Purpose
The dependence on the use of information systems for nearly every activity and functions in the internet is increasingly high. This form of interconnectedness has bolstered national economies, enhanced how governments interact with their citizens and how ordinary people connect with friends and family. However, this dependence has equally resulted to a high rise in vulnerability, threat and risk associated with more use of information and communication technology. Cyber-attacks that have the potential to disrupt or damage information system infrastructure are getting more complex with some level of sophistication. Traditional protection of information system infrastructure is no longer sufficient; systems have proven to be immune to failure or incidents. This paper aims to ensure that there is a continuous availability of services through a fail-safe proof.
Design/methodology/approach
MYSQL replication technique was used to develop a model based on three-tier layers using the principle of network interdependency and the replication techniques. Tier 1 depicts a Telecom organization serving as service provider that provides internet service to Tier 2 organization – a Bank; Tier 3 is the financial App that can be used by bank staff and customers. The fail-safe mode integrated mechanism enables Tier 3 to continue to render its services in the event of an attack on Tier 1 such as DDoS without disruption.
Findings
This technique succeeded in mitigating the loss of data if cyber incident occurred or reception of uninterrupted services is countered, which give rise to future master-to-master architecture.
Research limitations/implications
The study conducted is limited to the design and development of a fail-safe system for interdependent networks or systems using MYSQL replication technique.
Originality/value
In an interdependent environment such as the cyberspace, the sectors are interdependent for optimal results. The originality of the work ensures that there is availability of services which is sustained and that data integrity is assured using the fail-safe technique based on MySQL replication method.
Details