Search results

1 – 10 of 89
Article
Publication date: 16 November 2018

Yasmine Lahsinat, Dalila Boughaci and Belaid Benhamou

This paper aims to describe two enhancements of the variable neighbourhood search (VNS) algorithm to solve efficiently the minimum interference frequency assignment problem…

Abstract

Purpose

This paper aims to describe two enhancements of the variable neighbourhood search (VNS) algorithm to solve efficiently the minimum interference frequency assignment problem (MI-FAP) which is a major issue in the radio networks, as well as a well-known NP-hard combinatorial optimisation problem. The challenge is to assign a frequency to each transceiver of the network with limited or no interferences at all. Indeed, considering that the number of radio networks users is ever increasing and that the radio spectrum is a scarce and expensive resource, the latter should be carefully managed to avoid any interference.

Design/methodology/approach

The authors suggest two new enhanced VNS variants for MI-FAP, namely, the iterated VNS (It-VNS) and the breakout VNS (BVNS). These two algorithms were designed based on the hybridising and the collaboration approaches that have emerged as two powerful means to solve hard combinatorial optimisation problems. Therefore, these two methods draw their strength from other meta-heuristics. In addition, the authors introduced a new mechanism of perturbation to enhance the performance of VNS. An extensive experiment was conducted to evaluate the performance of the proposed methods on some well-known MI-FAP datasets. Moreover, they carried out a comparative study with other metaheuristics and achieved the Friedman’s non-parametric statistical test to check the actual effect of the proposed enhancements.

Findings

The experiments showed that the two enhanced methods (It-VNS) and (BVNS) achieved better results than the VNS method. The comparative study with other meta-heuristics showed that the results are competitive and very encouraging. The Friedman’s non-parametric statistical test reveals clearly that the results of the three methods (It-VNS, BVNS and VNS) are significantly different. The authors therefore carried out the Nemenyi’s post hoc test which allowed us to identify those differences. The impact of the operated change on both the It-VNS and BVNS was thus confirmed. The proposed BVNS is competitive and able to produce good results as compared with both It-VNS and VNS for MI-FAP.

Research limitations/implications

Approached methods and particularly newly designed ones may have some drawbacks that weaken the results, in particular when dealing with extensive data. These limitations should therefore be eliminated through an appropriate approach with a view to design appropriate methods in the case of large-scale data.

Practical implications

The authors designed and implemented two new variants of the VNS algorithm before carrying out an exhaustive experimental study. The findings highlighted the potential opportunities of these two enhanced methods which could be adapted and applied to other combinatorial optimisation problems, real world applications or academic problems.

Originality/value

This paper aims at enhancing the VNS algorithm through two new approaches, namely, the It-VNS and the BVNS. These two methods were applied to the MI-FAP which is a crucial problem arising in a radio network. The numerical results are interesting and demonstrate the benefits of the proposed approaches in particular BVNS for MI-FAP.

Details

Journal of Systems and Information Technology, vol. 20 no. 4
Type: Research Article
ISSN: 1328-7265

Keywords

Article
Publication date: 30 July 2019

Abraham Cyril Issac and Tina Susan Thomas

In an academic and research institution of repute, where the student researcher’s creative mind and innovative potentials are the kingpin factors, it is of primary interest to…

Abstract

Purpose

In an academic and research institution of repute, where the student researcher’s creative mind and innovative potentials are the kingpin factors, it is of primary interest to segregate and pool competencies at an individual level and to create dynamic synergetic effects. Knowledge about potential core competencies and own resources, facilitation of existing personal relationships and the development of new personal relations and cooperation are necessary prerequisites. This is where social network analysis (SNA) acts as a useful tool for measuring the performance of knowledge sharing.

Design/methodology/approach

The current study makes a detailed analysis of the knowledge sharing network among the student researchers. The research study estimates different parameters such as knowledge sharing in various departments, the motivation for research and research environment. This work mainly attempts to undertake a differential analysis of the knowledge sharing pattern among the research scholars with the aid of Pajek software and R programming.

Findings

A holistic knowledge sharing network for the entire set of research scholars is established and the centrality features of the network and among the departments are analyzed, leading to a road map which deliberates on whom to appease and whom to circumvent.

Research limitations/implications

Every institute or organization can use the SNA to identify the key stakeholders in the knowledge sharing environment or the kingpin actors who are prone to knowledge hiding. Such useful identification of the vital stakeholders can give information on how to eliminate the barriers in the knowledge management systems, so that enhanced level of collaboration happens.

Originality/value

This is the first comprehensive SNA to decipher the knowledge sharing pattern among researchers. This work characterizes knowledge management research literature and thereby offers to reduce redundant research by delineating the possible avenues in the area of knowledge sharing.

Details

Global Knowledge, Memory and Communication, vol. 69 no. 1/2
Type: Research Article
ISSN: 2514-9342

Keywords

Book part
Publication date: 29 February 2008

Benoît Dupont

Surveillance studies scholars have embraced Foucault's panopticon as a central metaphor in their analysis of online monitoring technologies, despite several architectural…

Abstract

Surveillance studies scholars have embraced Foucault's panopticon as a central metaphor in their analysis of online monitoring technologies, despite several architectural incompatibilities between eighteenth and nineteenth century prisons and twenty-first century computer networks. I highlight a number of Internet features that highlight the limits of the electronic panopticon. I examine two trends that have been considerably underestimated by surveillance scholars: (1) the democratization of surveillance, where the distributed structure of the Internet and the availability of observation technologies has blurred the distinction between those who watch and those who are being watched, allowing individuals or marginalized groups to deploy sophisticated surveillance technologies against the state or large corporations; and (2) the resistance strategies that Internet users are adopting to curb the surveillance of their online activities, through blocking moves such as the use of cryptography, or masking moves that are designed to feed meaningless data to monitoring tools. I conclude that these two trends are neglected by a majority of surveillance scholars because of biases that make them dismiss the initiative displayed by ordinary users, assess positive and negative outcomes differently, and confuse what is possible and what is probable.

Details

Surveillance and Governance: Crime Control and Beyond
Type: Book
ISBN: 978-0-7623-1416-4

Content available
Article
Publication date: 24 October 2008

29

Abstract

Details

Library Hi Tech News, vol. 25 no. 9
Type: Research Article
ISSN: 0741-9058

Article
Publication date: 11 August 2022

Albena Dzhurova and Arthur Sementelli

This paper examines how contemporary workplace surveillance can simultaneously incentivize and commodify workforce behavior. Specifically, workplace surveillance is…

Abstract

Purpose

This paper examines how contemporary workplace surveillance can simultaneously incentivize and commodify workforce behavior. Specifically, workplace surveillance is reconceptualized as rent-seeking, which offers a framework for analyzing novel employer-employee relationships stemming from alternate views of risk and reward.

Design/methodology/approach

The case of workplace microchipping is studied qualitatively as a backdrop for theorizing emergent labor relations in the context of surveillance capitalism and biopolitics.

Findings

Reconsidering surveillance within the context of personal risk and entrepreneurial lure offers much to 21st century discourse on labor and supervision. It is imperative that the public sector engages in appropriate regulatory protocols to manage emergent behavior in organizations.

Originality/value

This study departs from the popular conceptualization of human microchipping as an intersection of legal and ethical considerations of surveillance. Instead, the authors examine a different aspect of the microchipping phenomenon, taking into account employee creative reactions to employer surveillance in the context of risk and return.

Peer review

The peer review history for this article is available at: https://publons.com/publon/10.1108/IJSE-01-2022-0009

Details

International Journal of Social Economics, vol. 50 no. 1
Type: Research Article
ISSN: 0306-8293

Keywords

Article
Publication date: 1 August 2004

Barbara Glover and Eric Owen

Reports on the 14th Annual Conference on Computers, Freedom and Privacy, held in Berkeley, California in April 2004. Outlines the themes of the papers presented in the 12 plenary…

1471

Abstract

Reports on the 14th Annual Conference on Computers, Freedom and Privacy, held in Berkeley, California in April 2004. Outlines the themes of the papers presented in the 12 plenary sessions.

Details

Library Hi Tech News, vol. 21 no. 7
Type: Research Article
ISSN: 0741-9058

Keywords

Article
Publication date: 1 December 2000

Parag C. Pendharkar and James A. Rodger

client/server(C/S) systems have revolutionized the systems development approach. Among the drivers of the C/S systems is the lower price/performance ratio compared to the…

1075

Abstract

client/server(C/S) systems have revolutionized the systems development approach. Among the drivers of the C/S systems is the lower price/performance ratio compared to the mainframe‐based transaction processing systems. Data mining is a process of identifying patterns in corporate transactional and operational databases (also called data warehouses). As most Fortune 500 companies are moving quickly towards the client server systems, it is increasingly becoming important that a data mining approaches should be adapted for C/S systems. In the current paper, we describe different data mining approaches that are used in the C/S systems.

Details

Journal of Systems and Information Technology, vol. 4 no. 2
Type: Research Article
ISSN: 1328-7265

Keywords

Article
Publication date: 1 March 2005

Evert Gummesson

To discuss and analyse three themes in qualitative research in marketing which are objects of both frustration and confusion: analysis and interpretation; theory generation; and a…

21926

Abstract

Purpose

To discuss and analyse three themes in qualitative research in marketing which are objects of both frustration and confusion: analysis and interpretation; theory generation; and a quest for scientific pluralism and individual researcher lifestyles.

Design/methodology/approach

Underpinning the discussion is that complexity, ambiguity, fuzziness, chaos, change, uncertainty and unpredictability are characteristics of a market economy; that qualitative and subjective interpretation is necessary to add the spark of life to marketing data; and that general marketing theory needs more attention from researchers.

Practical implications

The proper use of methodology and the generation of better marketing theory will make it easier for practitioners to reach the right decisions.

Findings

Quantitative and qualitative research processes are not by nature antagonistic, although their advocates may be; quantitative methodology carries qualitative “bugs”, necessary for its sustenance.

Originality/value

The article ends with a recommendation that every researcher in marketing should design his or her individual research approach, one that suits the personality of the researcher. As an example, the author presents his own current methodology‐in‐use, interactive research.

Details

European Journal of Marketing, vol. 39 no. 3/4
Type: Research Article
ISSN: 0309-0566

Keywords

Article
Publication date: 1 April 2000

Paul R. Prabhaker

Powerful emerging technologies, fierce competition in the marketplace, more sophisticated consumers and the relentless drive for higher corporate earnings are at the root of…

4743

Abstract

Powerful emerging technologies, fierce competition in the marketplace, more sophisticated consumers and the relentless drive for higher corporate earnings are at the root of online consumers’ information privacy concerns. The issue of consumer privacy could be a defining element in the battle for the ownership of online consumers. Businesses have a choice in how they respond to this matter. They can see it as a threat and simply react defensively. Or they can treat this as an opportunity and be proactive in maximizing the gains. Clearly, businesses that add value to their offerings by leveraging Internet technology in coordination with a proactive policy to preserve consumer privacy will be the success stories of the future. The goal of this research is to identify the strategic and tactical opportunities created by online consumers’ privacy concerns. Approaches to treating the privacy concerns as a source of competitive advantage are clearly discussed.

Details

Journal of Consumer Marketing, vol. 17 no. 2
Type: Research Article
ISSN: 0736-3761

Keywords

Article
Publication date: 16 October 2009

Jennifer A. Pope and Aaron M. Lowen

Increasing availability of data obtained via the internet and the proliferation of direct mail advertising provides tremendous opportunities for marketers to reach their…

1880

Abstract

Purpose

Increasing availability of data obtained via the internet and the proliferation of direct mail advertising provides tremendous opportunities for marketers to reach their customers. However, increased risks to the personal privacy of consumers, and attention in the media to these risks, provide unique challenges. Companies and especially direct marketers are finding that they need to change their tactics to deal with the increase in consumer concerns and privacy‐protecting behaviors. This paper aims to address these issues.

Design/methodology/approach

Using the results of a multinational privacy survey, the paper examines consumer privacy concerns and privacy‐protecting behaviors in the USA and Canada. It uses factor analysis and multiple regression techniques to analyze the data.

Findings

While consumer concerns about privacy are essentially the same between the two countries, the privacy‐protecting behaviors differed significantly. The paper also suggests that demographic variables influence a consumer's level of concern and likelihood to take privacy‐protecting behaviors.

Research limitations/implications

The behaviors in the paper are self‐reported and therefore potentially subject to self‐desirability bias. Also, missing data limited the ability to test for the impact of income.

Practical implications

The paper provides recommendations for marketers to address customer concerns and behaviors such as providing greater transparency and use of privacy seals.

Originality/value

International companies face even greater challenges with regard to privacy issues and related customer behaviors due to cultural and governmental policy differences. This paper provides some guidelines for companies that need to provide privacy protection to customers from a variety of cultures.

Details

Direct Marketing: An International Journal, vol. 3 no. 4
Type: Research Article
ISSN: 1750-5933

Keywords

1 – 10 of 89