Search results

1 – 10 of 866
Open Access
Article
Publication date: 6 March 2017

Yueting Chai, Chunyan Miao, Baowen Sun, Yongqing Zheng and Qingzhong Li

The synthetic application and interaction of/between the internet, Internet of Things, cloud computing, big data, Industry 4.0 and other new patterns and new technologies shall…

3377

Abstract

Purpose

The synthetic application and interaction of/between the internet, Internet of Things, cloud computing, big data, Industry 4.0 and other new patterns and new technologies shall breed future Web-based industrial operation system and social operation management patterns, manifesting as a crowd cyber eco-system composed of multiple interconnected intelligent agents (enterprises, individuals and governmental agencies) and its dynamic behaviors. This paper aims to explore the basic principles and laws of such a system and its behavior.

Design/methodology/approach

The authors propose the concepts of crowd science and engineering (CSE) and expound its main content, thus forming a research framework of theories and methodologies of crowd science.

Findings

CSE is expected to substantially promote the formation and development of crowd science and thus lay a foundation for the advancement of Web-based industrial operation system and social operation management patterns.

Originality/value

This paper is the first one to propose the concepts of CSE, which lights the beacon for the future research in this area.

Details

International Journal of Crowd Science, vol. 1 no. 1
Type: Research Article
ISSN: 2398-7294

Keywords

Open Access
Article
Publication date: 22 March 2021

Laurence Saglietto

This study aims to review the literature on sharing economy logistics and crowd logistics to answer the three following questions: How is the literature on sharing economy…

2396

Abstract

Purpose

This study aims to review the literature on sharing economy logistics and crowd logistics to answer the three following questions: How is the literature on sharing economy logistics structured? What are the main trends in sharing economy logistics and crowd logistics? What are the future research options?

Design/methodology/approach

Bibliometric analysis is used to evaluate 85 articles published over the past 12 years; it identifies the top academic journals, authors and research topics contributing to the field.

Findings

The sharing economy logistics and crowd logistics literature is structured around several disciplines and highlights that some are more scientifically advanced than others in their subject definitions, designs, modelling and innovative solutions. The main trends are organized around three clusters: Cluster 1 refers to the optimal allocation of costs, prices, distribution and supplier relationships; Cluster 2 corresponds to business related crowdsourcing and international industry practices; and Cluster 3 includes the impact of transport on last-mile delivery, crowd shipping and the environment.

Research limitations/implications

The study is based on data from peer-reviewed scientific journals and conferences. A broader overview could include other data sources such as books, book chapters, working papers, etc.

Originality/value

Future research directions are discussed in the context of the evolution from crowd logistics to crowd intelligence, and the complexities of crowd logistics such as understanding how the social crowd can be integrated into the logistics process. Our results are part of the crowd science and engineering concept and provide some answers about crowd cyber-system questions regarding crowd intelligence in logistic sector.

Details

International Journal of Crowd Science, vol. 5 no. 1
Type: Research Article
ISSN: 2398-7294

Keywords

Open Access
Article
Publication date: 1 March 2021

Yiqiang Feng, Leiju Qiu and Baowen Sun

The originality of the crowd cyber system lies in the fact that it possesses the intelligence of multiple groups including intelligence of people, intelligence of objects and…

1203

Abstract

Purpose

The originality of the crowd cyber system lies in the fact that it possesses the intelligence of multiple groups including intelligence of people, intelligence of objects and intelligence of machines. However, quantitative analysis of the level of intelligence is not sufficient, due to many limitations, such as the unclear definition of intelligence and the inconformity of human intelligence quotient (IQ) test and artificial intelligence assessment methods. This paper aims to propose a new crowd intelligence measurement framework from the harmony of adaption and practice to measure intelligence in crowd network.

Design/methodology/approach

The authors draw on the ideas of traditional Confucianism, which sees intelligence from the dimensions of IQ and effectiveness. First, they clarify the related concepts of intelligence and give a new definition of crowd intelligence in the form of a set. Second, they propose four stages of the evolution of intelligence from low to high, and sort out the dilemma of intelligence measurement at the present stage. Third, they propose a framework for measuring crowd intelligence based on two dimensions.

Findings

The generalized IQ operator model is optimized, and a new IQ algorithm is proposed. Individuals with different IQs can have different relationships, such as cooperative, competitive, antagonistic and so on. The authors point out four representative forms of intelligence as well as its evolution stages.

Research limitations/implications

The authors, will use more rigorous mathematical symbols to represent the logical relationships between different individuals, and consider applying the measurement framework to a real-life situation to enrich the research on crowd intelligence in the further study.

Originality/value

Intelligence measurement is one of foundations of crowd science. This research lays the foundation for studying the interaction among human, machine and things from the perspective of crowd intelligence, which owns significant scientific value.

Details

International Journal of Crowd Science, vol. 5 no. 1
Type: Research Article
ISSN: 2398-7294

Keywords

Open Access
Article
Publication date: 13 August 2019

Yuejiang Li, H. Vicky Zhao and Yan Chen

With the popularity of the internet and the increasing numbers of netizens, tremendous information flows are generated daily by the intelligently interconnected individuals. The…

1498

Abstract

Purpose

With the popularity of the internet and the increasing numbers of netizens, tremendous information flows are generated daily by the intelligently interconnected individuals. The diffusion processes of different information are not independent, and they interact with and influence each other. Modeling and analyzing the interaction between correlated information play an important role in the understanding of the characteristics of information dissemination and better control of the information flows. This paper aims to model the correlated information diffusion process over the crowd intelligence networks.

Design/methodology/approach

This study extends the classic epidemic susceptible–infectious–recovered (SIR) model and proposes the SIR mixture model to describe the diffusion process of two correlated pieces of information. The whole crowd is divided into different groups with respect to their forwarding state of the correlated information, and the transition rate between different groups shows the property of each piece of information and the influences between them.

Findings

The stable state of the SIR mixture model is analyzed through the linearization of the model, and the stable condition can be obtained. Real data are used to validate the SIR mixture model, and the detailed diffusion process of correlated information can be inferred by the analysis of the parameters learned through fitting the real data into the SIR mixture model.

Originality/value

The proposed SIR mixture model can be used to model the diffusion of correlated information and analyze the propagation process.

Details

International Journal of Crowd Science, vol. 3 no. 2
Type: Research Article
ISSN: 2398-7294

Keywords

Open Access
Article
Publication date: 6 August 2019

Shipeng Wang, Lizhen Cui, Lei Liu, Xudong Lu and Qingzhong Li

The purpose of this paper is to build cyber-physical-psychological ternary fusion crowd intelligence network and realize comprehensive, real, correct and synchronous projection in…

Abstract

Purpose

The purpose of this paper is to build cyber-physical-psychological ternary fusion crowd intelligence network and realize comprehensive, real, correct and synchronous projection in cyber–physical–psychological ternary fusion system. Since the network of crowd intelligence is the future interconnected network system that takes on the features of large scale, openness and self-organization. The Digital-selfs in the network of crowd intelligence interact and cooperate with each other to finish transactions and achieve co-evolution eventually.

Design/methodology/approach

To realize comprehensive, real, correct and synchronous projection between cyber–physical–psychological ternary fusion system, the authors propose the rules and methods of projection from real world to the CrowdIntell Network. They build the mental model of the Digital-self including structure model and behavior model in four aspects: identity, provision, demand and connection, thus forming a theoretical mental model framework of Digital-self.

Findings

The mental model is excepted to lay a foundation for the theory of modeling and simulation in the research of crowd science and engineering.

Originality/value

This paper is the first one to propose the mental model framework and projection rules and methods of Digital-selfs in network of crowd intelligence, which lays a solid foundation for the theory of modeling, simulation, intelligent transactions, evolution and stability of CrowdIntell Network system, thus promoting the development of crowd science and engineering.

Details

International Journal of Crowd Science, vol. 3 no. 2
Type: Research Article
ISSN: 2398-7294

Keywords

Open Access
Article
Publication date: 6 March 2017

Takayuki Ito, Takanobu Otsuka, Satoshi Kawase, Akihisa Sengoku, Shun Shiramatsu, Takanori Ito, Eizo Hideshima, Tokuro Matsuo, Tetsuya Oishi, Rieko Fujita, Naoki Fukuta and Katsuhide Fujita

This paper aims to present a preliminary experimental result on a large-scale experiment on a cyber-physical hybrid discussion support environment in a panel discussion session in…

1838

Abstract

Purpose

This paper aims to present a preliminary experimental result on a large-scale experiment on a cyber-physical hybrid discussion support environment in a panel discussion session in an international conference.

Design/methodology/approach

In this paper, the authors propose a hybrid (cyber-physical) environment in which people can discuss online and also offline simultaneously. The authors conducted a large-scale experiment in a panel discussion session in an international conference where participants can discuss by using their online discussion support system and by physical communications as usual.

Findings

The authors analyzed the obtained date from the following three viewpoints: participants’ cyber-physical attention, keywords cyber-physical linkage and cyber-physical discussion flow. These three viewpoints indicate that the methodology of the authors can be effective to support hybrid large-scale discussions.

Originality/value

Online large-scale discussion has been focused as a new methodology that enable people to discuss, argue and make consensus in terms of political issues, social complex problems (like climate change), city planning and so on. In several cases, the authors found that online discussions are very effective to gather people opinions and discussions so far. Moreover, this paper proposes a hybrid (cyber-physical) environment in which people can discuss online and also offline simultaneously.

Details

International Journal of Crowd Science, vol. 1 no. 1
Type: Research Article
ISSN: 2398-7294

Keywords

Article
Publication date: 21 July 2020

Mohammad Moradi and Qi Li

Over the past decade, many research works in various disciplines have benefited from the endless ocean of people and their potentials (in the form of crowdsourcing) as an…

Abstract

Purpose

Over the past decade, many research works in various disciplines have benefited from the endless ocean of people and their potentials (in the form of crowdsourcing) as an effective problem-solving strategy and computational model. But nothing interesting is ever completely one-sided. Therefore, when it comes to leveraging people's power, as the dark side of crowdsourcing, there are some possible threats that have not been considered as should be, such as recruiting black hat crowdworkers for organizing targeted adversarial intentions. The purpose of this paper is to draw more attention to this critical issue through investigation of its different aspects.

Design/methodology/approach

To delve into details of such malicious intentions, the related literature and previous researches have been studied. Then, four major typologies for adversarial crowdsourced attacks as well as some real-world scenarios are discussed and delineated. Finally, possible future threats are introduced.

Findings

Despite many works on adversarial crowdsourcing, there are only a few specific research studies devoted to considering the issue in the context of cyber security. In this regard, the proposed typologies (and addressed scenarios) for such human-mediated attacks can shed light on the way of identifying and confronting such threats.

Originality/value

To the best of the authors' knowledge, this the first work in which the titular topic is investigated in detail. Due to popularity and efficiency of leveraging crowds' intelligence and efforts in a wide range of application domains, it is most likely that adversarial human-driven intentions gain more attention. In this regard, it is anticipated that the present research study can serve as a roadmap for proposing defensive mechanisms to cope with such diverse threats.

Details

Journal of Information, Communication and Ethics in Society, vol. 19 no. 1
Type: Research Article
ISSN: 1477-996X

Keywords

Content available
Book part
Publication date: 6 September 2021

Abstract

Details

The Role of Law Enforcement in Emergency Management and Homeland Security
Type: Book
ISBN: 978-1-78769-336-4

Article
Publication date: 2 December 2019

Abhijeet Ghadge, Maximilian Weiß, Nigel D. Caldwell and Richard Wilding

In spite of growing research interest in cyber security, inter-firm based cyber risk studies are rare. Therefore, this study aims to investigate cyber risk management in supply…

6583

Abstract

Purpose

In spite of growing research interest in cyber security, inter-firm based cyber risk studies are rare. Therefore, this study aims to investigate cyber risk management in supply chain contexts.

Design/methodology/approach

Adapting a systematic literature review process, papers from interdisciplinary areas published between 1990 and 2017 were selected. Different typologies, developed for conducting descriptive and thematic analysis, were established using data mining techniques to conduct a comprehensive, replicable and transparent review.

Findings

The review identifies multiple future research directions for cyber security/resilience in supply chains. A conceptual model is developed, which indicates a strong link between information technology, organisational and supply chain security systems. The human/behavioural elements within cyber security risk are found to be critical; however, behavioural risks have attracted less attention because of a perceived bias towards technical (data, application and network) risks. There is a need for raising risk awareness, standardised policies, collaborative strategies and empirical models for creating supply chain cyber-resilience.

Research limitations/implications

Different types of cyber risks and their points of penetration, propagation levels, consequences and mitigation measures are identified. The conceptual model developed in this study drives an agenda for future research on supply chain cyber security/resilience.

Practical implications

A multi-perspective, systematic study provides a holistic guide for practitioners in understanding cyber-physical systems. The cyber risk challenges and the mitigation strategies identified support supply chain managers in making informed decisions.

Originality/value

To the best of the authors’ knowledge, this is the first systematic literature review on managing cyber risks in supply chains. The review defines supply chain cyber risk and develops a conceptual model for supply chain cyber security systems and an agenda for future studies.

Open Access
Article
Publication date: 7 April 2020

Fatima M. Isiaka, Salihu Abdullahi Audu and Mustafa Ahmed Umar

The dependence on the use of information systems for nearly every activity and functions in the internet is increasingly high. This form of interconnectedness has bolstered…

2247

Abstract

Purpose

The dependence on the use of information systems for nearly every activity and functions in the internet is increasingly high. This form of interconnectedness has bolstered national economies, enhanced how governments interact with their citizens and how ordinary people connect with friends and family. However, this dependence has equally resulted to a high rise in vulnerability, threat and risk associated with more use of information and communication technology. Cyber-attacks that have the potential to disrupt or damage information system infrastructure are getting more complex with some level of sophistication. Traditional protection of information system infrastructure is no longer sufficient; systems have proven to be immune to failure or incidents. This paper aims to ensure that there is a continuous availability of services through a fail-safe proof.

Design/methodology/approach

MYSQL replication technique was used to develop a model based on three-tier layers using the principle of network interdependency and the replication techniques. Tier 1 depicts a Telecom organization serving as service provider that provides internet service to Tier 2 organization – a Bank; Tier 3 is the financial App that can be used by bank staff and customers. The fail-safe mode integrated mechanism enables Tier 3 to continue to render its services in the event of an attack on Tier 1 such as DDoS without disruption.

Findings

This technique succeeded in mitigating the loss of data if cyber incident occurred or reception of uninterrupted services is countered, which give rise to future master-to-master architecture.

Research limitations/implications

The study conducted is limited to the design and development of a fail-safe system for interdependent networks or systems using MYSQL replication technique.

Originality/value

In an interdependent environment such as the cyberspace, the sectors are interdependent for optimal results. The originality of the work ensures that there is availability of services which is sustained and that data integrity is assured using the fail-safe technique based on MySQL replication method.

Details

International Journal of Crowd Science, vol. 4 no. 2
Type: Research Article
ISSN: 2398-7294

Keywords

1 – 10 of 866