Search results

1 – 10 of 80
Article
Publication date: 21 July 2023

Serap Ergün

The purpose of this study is to propose a decentralized multi-party cross-trading scheme based on a certificate transaction mechanism for the transaction of excess consumption…

Abstract

Purpose

The purpose of this study is to propose a decentralized multi-party cross-trading scheme based on a certificate transaction mechanism for the transaction of excess consumption certificates (ECCs) of renewable energy. The aim is to address the problems associated with the existing centralized transaction mode and to promote the development of the green electricity industry.

Design/methodology/approach

The proposed scheme involves calculating the quotation difference for the same type of certificate transaction based on the quotations of all users of both buyers and sellers. The transaction volume is then determined based on the order of quotation difference from large to small, and the total interests of cooperation are calculated. The nucleolus method is adopted to allocate the total interests to each member of the alliance and calculate the final transaction price. The blockchain technology is used for the transaction to achieve accurate traceability and efficient supervision, and a corresponding smart contract is designed and simulated in the Ethereum consortium chain.

Findings

The results of the simulation show the rationality and effectiveness of the proposed scheme. The decentralized multi-party cross-trading scheme can overcome the problems associated with the existing centralized transaction mode, such as low transaction efficiency, difficulty in obtaining the optimal transaction strategy and efficient supervision. The proposed scheme can promote the development of the green electricity industry by stimulating users' demand potential for green electricity.

Originality/value

The proposed scheme is original in its use of a certificate transaction mechanism to facilitate the trading of ECCs of renewable energy. The scheme adopts a decentralized multi-party cross-trading approach that overcomes the problems associated with the existing centralized transaction mode. The use of the nucleolus method for the allocation of total interests to each member of the alliance is also original. Finally, the use of blockchain technology for accurate traceability and efficient supervision of the transaction is an original contribution to the field.

Open Access
Article
Publication date: 9 October 2023

Aya Khaled Youssef Sayed Mohamed, Dagmar Auer, Daniel Hofer and Josef Küng

Data protection requirements heavily increased due to the rising awareness of data security, legal requirements and technological developments. Today, NoSQL databases are…

1059

Abstract

Purpose

Data protection requirements heavily increased due to the rising awareness of data security, legal requirements and technological developments. Today, NoSQL databases are increasingly used in security-critical domains. Current survey works on databases and data security only consider authorization and access control in a very general way and do not regard most of today’s sophisticated requirements. Accordingly, the purpose of this paper is to discuss authorization and access control for relational and NoSQL database models in detail with respect to requirements and current state of the art.

Design/methodology/approach

This paper follows a systematic literature review approach to study authorization and access control for different database models. Starting with a research on survey works on authorization and access control in databases, the study continues with the identification and definition of advanced authorization and access control requirements, which are generally applicable to any database model. This paper then discusses and compares current database models based on these requirements.

Findings

As no survey works consider requirements for authorization and access control in different database models so far, the authors define their requirements. Furthermore, the authors discuss the current state of the art for the relational, key-value, column-oriented, document-based and graph database models in comparison to the defined requirements.

Originality/value

This paper focuses on authorization and access control for various database models, not concrete products. This paper identifies today’s sophisticated – yet general – requirements from the literature and compares them with research results and access control features of current products for the relational and NoSQL database models.

Details

International Journal of Web Information Systems, vol. 20 no. 1
Type: Research Article
ISSN: 1744-0084

Keywords

Article
Publication date: 13 September 2023

Hu Xue, Shanshan Jin, Qianrong Wu and Xianhui Geng

Platform certification constitutes an effective mechanism for managing the lemon problem concerning food e-commerce. This work aims to evaluate the market effect of platform…

Abstract

Purpose

Platform certification constitutes an effective mechanism for managing the lemon problem concerning food e-commerce. This work aims to evaluate the market effect of platform certification and analyzes its correction mechanism for lemon problem combined with reputation mechanism.

Design/methodology/approach

Utilizing the Gold Seller certification of Taobao.com to serve as an illustration, the authors conducted an empirical study based on the sales data of hairy crabs among 2,239 sample sites over six points in time from October to December 2019, systematically examining the market effect of food e-commerce platform certification along with the interaction between food e-commerce platform certification and reputation mechanisms, followed by a heterogeneity test by product price.

Findings

This study finds that sellers with platform certification can significantly increase their sales. The market effect of platform certification is more easily observed in the low-price product market. In addition, platform certification and reputation mechanisms have complementary effects. In a low-price product market, the complementary effect of platform certification and product reputation diminishes, while the complementary effect of platform certification and seller reputation disappears.

Originality/value

This study explores the market effect of food e-commerce platform certification, reveals the market effect of certification mechanism when multiple signaling mechanisms exist simultaneously and conducts an empirical test based on real market data. It provides a better comprehension of how platform certifications work in food e-commerce.

Details

China Agricultural Economic Review, vol. 15 no. 4
Type: Research Article
ISSN: 1756-137X

Keywords

Article
Publication date: 7 November 2023

Metin Sabuncu and Hakan Özdemir

This study aims to identify leather type and authenticity through optical coherence tomography.

Abstract

Purpose

This study aims to identify leather type and authenticity through optical coherence tomography.

Design/methodology/approach

Optical coherence tomography images taken from genuine and faux leather samples were used to create an image dataset, and automated machine learning algorithms were also used to distinguish leather types.

Findings

The optical coherence tomography scan results in a different image based on leather type. This information was used to determine the leather type correctly by optical coherence tomography and automatic machine learning algorithms. Please note that this system also recognized whether the leather was genuine or synthetic. Hence, this demonstrates that optical coherence tomography and automatic machine learning can be used to distinguish leather type and determine whether it is genuine.

Originality/value

For the first time to the best of the authors' knowledge, spectral-domain optical coherence tomography and automated machine learning algorithms were applied to identify leather authenticity in a noncontact and non-invasive manner. Since this model runs online, it can readily be employed in automated quality monitoring systems in the leather industry. With recent technological progress, optical coherence tomography combined with automated machine learning algorithms will be used more frequently in automatic authentication and identification systems.

Details

International Journal of Clothing Science and Technology, vol. 36 no. 1
Type: Research Article
ISSN: 0955-6222

Keywords

Article
Publication date: 17 June 2021

Ambica Ghai, Pradeep Kumar and Samrat Gupta

Web users rely heavily on online content make decisions without assessing the veracity of the content. The online content comprising text, image, video or audio may be tampered…

1177

Abstract

Purpose

Web users rely heavily on online content make decisions without assessing the veracity of the content. The online content comprising text, image, video or audio may be tampered with to influence public opinion. Since the consumers of online information (misinformation) tend to trust the content when the image(s) supplement the text, image manipulation software is increasingly being used to forge the images. To address the crucial problem of image manipulation, this study focusses on developing a deep-learning-based image forgery detection framework.

Design/methodology/approach

The proposed deep-learning-based framework aims to detect images forged using copy-move and splicing techniques. The image transformation technique aids the identification of relevant features for the network to train effectively. After that, the pre-trained customized convolutional neural network is used to train on the public benchmark datasets, and the performance is evaluated on the test dataset using various parameters.

Findings

The comparative analysis of image transformation techniques and experiments conducted on benchmark datasets from a variety of socio-cultural domains establishes the effectiveness and viability of the proposed framework. These findings affirm the potential applicability of proposed framework in real-time image forgery detection.

Research limitations/implications

This study bears implications for several important aspects of research on image forgery detection. First this research adds to recent discussion on feature extraction and learning for image forgery detection. While prior research on image forgery detection, hand-crafted the features, the proposed solution contributes to stream of literature that automatically learns the features and classify the images. Second, this research contributes to ongoing effort in curtailing the spread of misinformation using images. The extant literature on spread of misinformation has prominently focussed on textual data shared over social media platforms. The study addresses the call for greater emphasis on the development of robust image transformation techniques.

Practical implications

This study carries important practical implications for various domains such as forensic sciences, media and journalism where image data is increasingly being used to make inferences. The integration of image forgery detection tools can be helpful in determining the credibility of the article or post before it is shared over the Internet. The content shared over the Internet by the users has become an important component of news reporting. The framework proposed in this paper can be further extended and trained on more annotated real-world data so as to function as a tool for fact-checkers.

Social implications

In the current scenario wherein most of the image forgery detection studies attempt to assess whether the image is real or forged in an offline mode, it is crucial to identify any trending or potential forged image as early as possible. By learning from historical data, the proposed framework can aid in early prediction of forged images to detect the newly emerging forged images even before they occur. In summary, the proposed framework has a potential to mitigate physical spreading and psychological impact of forged images on social media.

Originality/value

This study focusses on copy-move and splicing techniques while integrating transfer learning concepts to classify forged images with high accuracy. The synergistic use of hitherto little explored image transformation techniques and customized convolutional neural network helps design a robust image forgery detection framework. Experiments and findings establish that the proposed framework accurately classifies forged images, thus mitigating the negative socio-cultural spread of misinformation.

Details

Information Technology & People, vol. 37 no. 2
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 12 March 2024

Elena Isabel Vazquez Melendez, Paul Bergey and Brett Smith

This study aims to examine the blockchain landscape in supply chain management by drawing insights from academic and industry literature. It identifies the key drivers…

404

Abstract

Purpose

This study aims to examine the blockchain landscape in supply chain management by drawing insights from academic and industry literature. It identifies the key drivers, categorizes the products involved and highlights the business values achieved by early adopters of blockchain technology within the supply chain domain. Additionally, it explores fingerprinting techniques to establish a robust connection between physical products and the blockchain ledger.

Design/methodology/approach

The authors combined the interpretive sensemaking systematic literature review to offer insights into how organizations interpreted their business challenges and adopted blockchain technology in their specific supply chain context; content analysis (using Leximancer automated text mining software) for concept mapping visualization, facilitating the identification of key themes, trends and relationships, and qualitative thematic analysis (NVivo) for data organization, coding and enhancing the depth and efficiency of analysis.

Findings

The findings highlight the transformative potential of blockchain technology and offer valuable insights into its implementation in optimizing supply chain operations. Furthermore, it emphasizes the importance of product provenance information to consumers, with blockchain technology offering certainty and increasing customer loyalty toward brands that prioritize transparency.

Research limitations/implications

This research has several limitations that should be acknowledged. First, there is a possibility that some relevant investigations may have been missed or omitted, which could impact the findings. In addition, the limited availability of literature on blockchain adoption in supply chains may restrict the scope of the conclusions. The evolving nature of blockchain adoption in supply chains also poses a limitation. As the technology is in its infancy, the authors expect that a rapidly emerging body of literature will provide more extensive evidence-based general conclusions in the future. Another limitation is the lack of information contrasting academic and industry research, which could have provided more balanced insights into the technology’s advancement. The authors attributed this limitation to the narrow collaborations between academia and industry in the field of blockchain for supply chain management.

Practical implications

Practitioners recognize the potential of blockchain in addressing industry-specific challenges, such as ensuring transparency and data provenance. Understanding the benefits achieved by early adopters can serve as a starting point for companies considering blockchain adoption. Blockchain technology can verify product origin, enable truthful certifications and comply with established standards, reinforcing trust among stakeholders and customers. Thus, implementing blockchain solutions can enhance brand reputation and consumer confidence by ensuring product authenticity and quality. Based on the results, companies can align their strategies and initiatives with their needs and expectations.

Social implications

In essence, the integration of blockchain technology within supply chain provenance initiatives not only influences economic aspects but also brings substantial social impacts by reinforcing consumer trust, encouraging sustainable and ethical practices, combating product counterfeiting, empowering stakeholders and contributing to a more responsible, transparent and progressive socioeconomic environment.

Originality/value

This study consolidates current knowledge on blockchain’s capacity and identifies the specific drivers and business values associated with early blockchain adoption in supply chain provenance. Furthermore, it underscores the critical role of product fingerprinting techniques in supporting blockchain for supply chain provenance, facilitating more robust and efficient supply chain operations.

Details

Supply Chain Management: An International Journal, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1359-8546

Keywords

Article
Publication date: 26 September 2023

Scott Foster, Trang Ly Thien, Anna Jayne Foster, Thi Hanh Tien Ho and Sarah Knight

The aim of this paper is to contribute to the discussion of wellbeing within the university education system by outlining the key issues and benefits and recognising future…

Abstract

Purpose

The aim of this paper is to contribute to the discussion of wellbeing within the university education system by outlining the key issues and benefits and recognising future research on digital well-being for students. The JISC Digital wellbeing paper highlights the many positive and negative impacts associated with digital wellbeing. This paper explores how some of these features have been considered within institutions within the UK and Vietnam and highlights the emerging research in one Vietnamese institution in relation to student wellbeing, where digital wellbeing was identified as a key concern.

Design/methodology/approach

This is a technical review article which summarises key guidance for organisational digital wellbeing and then reflects on the application in the UK (a developed economy) and in Vietnam (one of the fastest growing economies). This is the first time a review has been conducted from the perspective of different countries. There are two aspects to digital wellbeing, individual and the social or organisational perspectives.

Findings

The JISC Digital wellbeing paper highlights the many positive and negative impacts associated with digital wellbeing. This paper explores how some of these features have been considered within institutions within the UK and Vietnam and highlights the emerging research in one Vietnamese institution in relation to student wellbeing, where digital wellbeing was identified as a key concern. The context of digital wellbeing within higher education is then discussed drawing similarities between the UK and Vietnamese student experiences whilst acknowledging the limitations of current research within the field.

Originality/value

Many institutions have seen a rise in the number of wellbeing challenges, and there are few examples of specific initiatives aimed at addressing digital wellbeing challenges for their stakeholders. Existing research on students' wellbeing is predominately focused on undergraduate students and does not differentiate between undergraduate and postgraduate students, nor between masters, doctoral and professional level students and does not explore the impact of digital wellbeing discretely; this is an area which would benefit from future research.

Details

Higher Education, Skills and Work-Based Learning, vol. 14 no. 2
Type: Research Article
ISSN: 2042-3896

Keywords

Article
Publication date: 12 June 2023

Mark Anthony Camilleri

Many educators are increasingly acquainting themselves and becoming adept with interactive technologies like augmented reality and virtual reality. Some of them are also looking…

Abstract

Purpose

Many educators are increasingly acquainting themselves and becoming adept with interactive technologies like augmented reality and virtual reality. Some of them are also looking forward to using Metaverse applications, as they want to benefit from its immersive three-dimensional capabilities. Therefore, the purpose of this study is to critically review the extant literature to investigate how, why, where and when the Metaverse can be used for educational purposes. This study also discusses opportunities, challenges and risks related to this disruptive technology.

Design/methodology/approach

A Preferred Reporting Items for Systematic Reviews and Meta-Analyses rigorous protocol is used to search, extract, scrutinize and synthesize content from high-impact articles focused on the use of the Metaverse technology in the realms of education. Afterwards, this study theorizes on the costs and benefits of using this interactive technology with students.

Findings

A number of researchers are already experimenting with virtual technologies that are very similar to the Metaverse, in different contexts. This research indicates that most students are lured by immersive multi-sensory three-dimensional environments as well as by virtual reality applications that could simulate real-life situations and provide engaging experiences with virtual representations of people, places and objects. On the other hand, this study reveals that educators ought to consider the potential pitfalls of the Metaverse, including privacy breaches and security risks, as well as possible addictions and the development of mental health issues, among others.

Practical implications

Students and educators can use the Metaverse to catapult themselves in a simulated digital universe that could reconfigure their sensory inputs, definitions of space, time and points of access to information. This research calls for the development of regulatory instruments, including sound principles, guidelines and procedures that are intended to safeguard and protect Metaverse users.

Originality/value

This contribution implies that there is scope for educators to continue developing the Metaverse’s virtual spaces to improve their students’ motivations, aptitudes and learning outcomes. This study clarifies that the use of the Metaverse in education can create infinite possibilities to enhance their knowledge, competences and abilities through its immersive applications. Yet this paper also raises awareness about possible challenges in the short term as well on other risks associated to the prolonged use of this captivating technology.

Details

Interactive Technology and Smart Education, vol. 21 no. 2
Type: Research Article
ISSN: 1741-5659

Keywords

Open Access
Book part
Publication date: 30 November 2023

Kerstin Sahlin and Ulla Eriksson-Zetterquist

Recent changes in university systems, debates on academic freedom, and changing roles of knowledge in society all point to questions regarding how higher education and research…

Abstract

Recent changes in university systems, debates on academic freedom, and changing roles of knowledge in society all point to questions regarding how higher education and research should be governed and the role of scientists and faculty in this. Rationalizations of systems of higher education and research have been accompanied by the questioning and erosion of faculty authority and challenges to academic collegiality. In light of these developments, we see a need for a more conceptually precise discussion about what academic collegiality is, how it is practiced, how collegial forms of governance may be supported or challenged by other forms of governance, and finally, why collegial governance of higher education and research is important.

We see collegiality as an institution of self-governance that includes formal rules and structures for decision-making, normative and cognitive underpinnings of identities and purposes, and specific practices. Studies of collegiality then, need to capture structures and rules as well as identities, norms, purposes and practices. Distinguishing between vertical and horizontal collegiality, we show how they balance and support each other.

Universities are subject to mixed modes of governance related to the many tasks and missions that higher education and research is expected to fulfill. Mixed modes of governance also stem from reforms based on widely held ideals of governance and organization. We examine university reforms and challenges to collegiality through the lenses of three ideal types of governance – collegiality, bureaucracy and enterprise – and combinations thereof.

Details

University Collegiality and the Erosion of Faculty Authority
Type: Book
ISBN: 978-1-80455-814-0

Keywords

Book part
Publication date: 20 November 2023

Surjeet Dalal, Bijeta Seth and Magdalena Radulescu

Customers today expect businesses to cater to their individual needs by tailoring the products they purchase to their own preferences. The term “Industry 5.0” refers to a new wave…

Abstract

Customers today expect businesses to cater to their individual needs by tailoring the products they purchase to their own preferences. The term “Industry 5.0” refers to a new wave of manufacturing that aims to meet each customer's unique demands. Even while Industry 4.0 allowed for mass customization, that wasn't good enough before, customers today demand individualized products at scale, and Industry 5.0 is driving the transition from mass customization to mass personalization to meet these demands. It caters to the individual needs of each consumer by meeting their demands. More specialized components for use in medicine are made possible by the widespread customization made possible by Industry 5.0. These individualized parts are included into the medical care of the patient to meet their specific needs and preferences. In the current medical revolution, an enabling technology of Industry 5.0 can produce medical implants, artificial organs, bodily fluids, and transplants with pinpoint accuracy. With the advent of AI-enabled sensors, we now live in a world where data can be swiftly analyzed. Machines may be programmed to make complex choices on the fly. In the medical field, these innovations allow for exact measurement and monitoring of human body variables according to the individual's needs. They aid in monitoring the body's response to training for peak performance. It allows for the digital dissemination of accurate healthcare data networks. In order to collect and exchange relevant patient data, every equipment is online.

Details

Digitalization, Sustainable Development, and Industry 5.0
Type: Book
ISBN: 978-1-83753-191-2

Keywords

1 – 10 of 80