Search results

1 – 10 of 654
Article
Publication date: 22 December 2023

Youying Wang, Shuqin Zhang, Lei Gong and Qian Huang

This study aims to investigate the effect of social media use on healthcare workers’ psychological safety and task performance and the moderating role of perceived respect from…

Abstract

Purpose

This study aims to investigate the effect of social media use on healthcare workers’ psychological safety and task performance and the moderating role of perceived respect from patients during public health crises.

Design/methodology/approach

To test the proposed moderated mediation model, a survey was conducted in 12 Chinese medical institutions. A total of 637 valid questionnaires were collected for data analysis.

Findings

The results revealed that psychological safety mediated the relationships between task-related social media (TSM) use and social-related social media (SSM) use and task performance. In addition, perceived respect from patients moderated the relationship between TSM use and psychological safety, as well as the indirect relationship between TSM use and task performance through psychological safety.

Originality/value

This study sheds new light on understanding how different types of social media use influence task performance in the context of public health crises. Furthermore, this study considers the interactions of healthcare workers with colleagues and patients and examines the potential synergistic effects of these interactions on healthcare workers’ psychological state and task performance.

Details

Industrial Management & Data Systems, vol. 124 no. 2
Type: Research Article
ISSN: 0263-5577

Keywords

Content available
Book part
Publication date: 23 May 2023

Abstract

Details

Digital Politics, Digital Histories, Digital Futures
Type: Book
ISBN: 978-1-80382-201-3

Content available
Book part
Publication date: 30 November 2023

Athina Karatzogianni and Jacob Matthews

Abstract

Details

Fractal Leadership
Type: Book
ISBN: 978-1-83797-108-4

Content available
Book part
Publication date: 29 November 2023

Ioannis Avramopoulos

Abstract

Details

Organization and Governance Using Algorithms
Type: Book
ISBN: 978-1-83797-060-5

Content available
Book part
Publication date: 16 June 2023

Leda Balbino

Abstract

Details

Digital Memory in Brazil
Type: Book
ISBN: 978-1-80262-803-6

Book part
Publication date: 4 September 2023

Stephen E. Spear and Warren Young

Abstract

Details

Overlapping Generations: Methods, Models and Morphology
Type: Book
ISBN: 978-1-83753-052-6

Content available
Book part
Publication date: 9 November 2023

Abstract

Details

Duty to Revolt
Type: Book
ISBN: 978-1-80382-316-4

Article
Publication date: 2 January 2023

Deepak Choudhary

As the number of devices that connect to the Internet of Things (IoT) has grown, privacy and security issues have come up. Because IoT devices collect so much sensitive…

Abstract

Purpose

As the number of devices that connect to the Internet of Things (IoT) has grown, privacy and security issues have come up. Because IoT devices collect so much sensitive information, like user names, locations, phone numbers and even how they usually use energy, it is very important to protect users' privacy and security. IoT technology will be hard to use on the client side because IoT-enabled devices do not have clear privacy and security controls.

Design/methodology/approach

IoT technology would be harder to use on the client side if the IoT did not offer enough well-defined ways to protect users’ privacy and security. The goal of this research is to protect people's privacy in the IoT by using the oppositional artificial flora optimization (EGPKC-OAFA) algorithm to generate the best keys for the ElGamal public key cryptosystem (EGPKC). The EGPKC-OAFA approach puts the most weight on the IEEE 802.15.4 standard for MAC, which is the most important part of the standard. The security field is part of the MAC header of this standard. In addition, the MAC header includes EGPKC, which makes it possible to make authentication keys as quickly as possible.

Findings

With the proliferation of IoT devices, privacy and security have become major concerns in the academic world. Security and privacy are of the utmost importance due to the large amount of personally identifiable information acquired by IoT devices, such as name, location, phone numbers and energy use. Client-side deployment of IoT technologies will be hampered by the absence of well-defined privacy and security solutions afforded by the IoT. The purpose of this research is to present the EGPKC with optimum key generation using the EGPKC-OAFA algorithm for the purpose of protecting individual privacy within the context of the IoT. The EGPKC-OAFA approach is concerned with the MAC standard defined by the IEEE 802.15.4 standard, which includes the security field in its MAC header. Also, the MAC header incorporates EGPKC, which enables the fastest possible authentication key generation. In addition, the best methodology award goes to the OAFA strategy, which successfully implements the optimum EGPKC selection strategy by combining opposition-based (OBL) and standard AFA ideas. The EGPKC-OAFA method has been proved to effectively analyze performance in a number of simulations, with the results of various functions being identified.

Originality/value

In light of the growing prevalence of the IoT, an increasing number of people are becoming anxious about the protection and confidentiality of the personal data that they save online. This is especially true in light of the fact that more and more things are becoming connected to the internet. The IoT is capable of gathering personally identifiable information such as names, addresses and phone numbers, as well as the quantity of energy that is used. It will be challenging for customers to adopt IoT technology because of worries about the security and privacy of the data generated by users. In this work, the EGPKC is paired with adversarial artificial flora, which leads in an increase to the privacy security provided by EGPKC for the IoT (EGPKC-OAFA). The MAC security field that is part of the IEEE 802.15.4 standard is one of the areas that the EGPKC-OAFA protocol places a high focus on. The Authentication Key Generation Protocol Key Agreement, also known as EGPKCA, is used in MAC headers. The abbreviation for this protocol is EGPKCA. The OAFA technique, also known as the combination of OBL and AFA, is the most successful method for selecting EGPKCs. This method is recognized by its acronym, OAFA. It has been shown via a variety of simulations that the EGPKC-OAFA technique is a very useful instrument for carrying out performance analysis.

Details

International Journal of Pervasive Computing and Communications, vol. 19 no. 5
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 20 September 2023

Hei-Chia Wang, Army Justitia and Ching-Wen Wang

The explosion of data due to the sophistication of information and communication technology makes it simple for prospective tourists to learn about previous hotel guests'…

Abstract

Purpose

The explosion of data due to the sophistication of information and communication technology makes it simple for prospective tourists to learn about previous hotel guests' experiences. They prioritize the rating score when selecting a hotel. However, rating scores are less reliable for suggesting a personalized preference for each aspect, especially when they are in a limited number. This study aims to recommend ratings and personalized preference hotels using cross-domain and aspect-based features.

Design/methodology/approach

We propose an aspect-based cross-domain personalized recommendation (AsCDPR), a novel framework for rating prediction and personalized customer preference recommendations. We incorporate a cross-domain personalized approach and aspect-based features of items from the review text. We extracted aspect-based feature vectors from two domains using bidirectional long short-term memory and then mapped them by a multilayer perceptron (MLP). The cross-domain recommendation module trains MLP to analyze sentiment and predict item ratings and the polarities of the aspect based on user preferences.

Findings

Expanded by its synonyms, aspect-based features significantly improve the performance of sentiment analysis on accuracy and the F1-score matrix. With relatively low mean absolute error and root mean square error values, AsCDPR outperforms matrix factorization, collaborative matrix factorization, EMCDPR and Personalized transfer of user preferences for cross-domain recommendation. These values are 1.3657 and 1.6682, respectively.

Research limitation/implications

This study assists users in recommending hotels based on their priority preferences. Users do not need to read other people's reviews to capture the key aspects of items. This model could enhance system reliability in the hospitality industry by providing personalized recommendations.

Originality/value

This study introduces a new approach that embeds aspect-based features of items in a cross-domain personalized recommendation. AsCDPR predicts ratings and provides recommendations based on priority aspects of each user's preferences.

Details

Data Technologies and Applications, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2514-9288

Keywords

Article
Publication date: 20 July 2023

Shahin Rajaei Qazlue, Ahmad Mehrabian, Kaveh Khalili-Damghani and Mohammad Amirkhan

Because of the importance of the wheat industry in the economy, a real-featured performance measurement approach is essential for the wheat production process. The purpose of this…

Abstract

Purpose

Because of the importance of the wheat industry in the economy, a real-featured performance measurement approach is essential for the wheat production process. The purpose of this paper is to develop a data envelopment analysis (DEA) model that is fully compatible with the wheat production process so that managers and farmers can use it to evaluate the efficiency of wheat farms for strategic decisions.

Design/methodology/approach

A dynamic multi-stage network DEA model is developed to evaluate the efficiency of wheat production farms in short-term (two-year) and long-term (eight-year) periods.

Findings

The results of this study show that because of the lack of long-term planning and excessive reliance on rain, most of the investigated regions have no stability in efficiency, and the efficiency of the regions changes in a zigzag manner over time. Among studied regions, only the Hashtrood region has high and stable efficiency, and other regions can follow the example of this region's cultivation method.

Originality/value

To the best of the authors’ knowledge, this study is the first one that uses the dynamic multi-stage network DEA considering every other year cultivation method and direct–indirect inputs in the agricultural section.

Details

Journal of Modelling in Management, vol. 19 no. 2
Type: Research Article
ISSN: 1746-5664

Keywords

1 – 10 of 654