Search results

1 – 10 of over 53000
To view the access options for this content please click here
Book part
Publication date: 30 December 2004

Ross R. Vickers

Constructing and evaluating behavioral science models is a complex process. Decisions must be made about which variables to include, which variables are related to each…

Abstract

Constructing and evaluating behavioral science models is a complex process. Decisions must be made about which variables to include, which variables are related to each other, the functional forms of the relationships, and so on. The last 10 years have seen a substantial extension of the range of statistical tools available for use in the construction process. The progress in tool development has been accompanied by the publication of handbooks that introduce the methods in general terms (Arminger et al., 1995; Tinsley & Brown, 2000a). Each chapter in these handbooks cites a wide range of books and articles on specific analysis topics.

Details

The Science and Simulation of Human Performance
Type: Book
ISBN: 978-1-84950-296-2

To view the access options for this content please click here
Article
Publication date: 17 February 2021

Julián Darío Miranda-Calle, Vikranth Reddy C., Parag Dhawan and Prathamesh Churi

The impact of cyberattacks all over the world has been increasing at a constant rate every year. Performing exploratory analysis helps organizations to identify, manage…

Abstract

Purpose

The impact of cyberattacks all over the world has been increasing at a constant rate every year. Performing exploratory analysis helps organizations to identify, manage and safeguard the information that could be vulnerable to cyber-attacks. It encourages to the creation of a plan for security controls that can help to protect data and keep constant tabs on threats and monitor their organization’s networks for any breaches.

Design/methodology/approach

The purpose of this experimental study is to state the use of data science in analyzing data and to provide a more detailed view of the most common cybersecurity attacks, what are the most accessed logical ports, visible patterns, as well as the trends and occurrence of attacks. The data to be processed has been obtained by aggregating data provided by a company’s technology department, which includes network flow data produced by nine different types of attacks within every day user activities. This could be insightful for many companies to measure the damage caused by these breaches but also gives a foundation for future comparisons and serves as a basis for proactive measures within industry and organizations.

Findings

The most common cybersecurity attacks, most accessed logical ports and their visible patterns were found in the acquired data set. The strategies, which attackers have used with respect to time, type of attacks, specific ports, IP addresses and their relationships have been determined. The statistical hypothesis was also performed to check whether attackers were confined to perform random attacks or to any specific machines with some pattern.

Originality/value

Policies can be suggested such that if an attack is conducted on a specific machine, which can be prevented by identifying the machine, ports and duration of the attacks on which the attacker is targeting and to formulate such policies that the organization should follow to tackle these targeted attacks in the future.

Details

World Journal of Engineering, vol. 18 no. 5
Type: Research Article
ISSN: 1708-5284

Keywords

To view the access options for this content please click here
Article
Publication date: 12 June 2020

Triss Ashton and Victor R. Prybutok

The purpose of this study includes two parts. First, it introduces a machine-based method for model and instrument development and updating that integrates large sample…

Abstract

Purpose

The purpose of this study includes two parts. First, it introduces a machine-based method for model and instrument development and updating that integrates large sample qualitative data. Second, a new model and instrument for e-commerce customer satisfaction are developed.

Design/methodology/approach

The research occurs in two phases. In Phase 1, data collection occurs with a literature-based quantitative model and instrument that includes at least one qualitative scale item per construct. Data analysis of the resulting data includes factor analysis (FA) and latent semantic analysis text mining to generate an updated model and instrument. In Phase 2, data collection uses the new model and instrument. Data analysis in Phase 2 includes exploratory data analysis with FA, exploratory structural equation modeling and partial least square modeling.

Findings

As a result of the information gained by the integration of qualitative scales in the literature-based survey, the final model departs substantially from the initial research-based research model. It integrates many of the constructs known to impact a website and software usability from information systems research into a new e-retail satisfaction model.

Originality/value

The research method, as presented here, offers a strategy for integrating large scale qualitative data for refinement of models and the development of instruments. It is essentially a method of gaining the wisdom of crowds economically while simultaneously reducing the biases and laborious effort commonly associated with qualitative research.

Details

Journal of Modelling in Management, vol. 15 no. 4
Type: Research Article
ISSN: 1746-5664

Keywords

To view the access options for this content please click here
Article
Publication date: 4 July 2016

Oscar Peña, Unai Aguilera and Diego López-de-Ipiña

– The purpose of this paper is to present a new approach toward automatically visualizing Linked Open Data (LOD) through metadata analysis.

Abstract

Purpose

The purpose of this paper is to present a new approach toward automatically visualizing Linked Open Data (LOD) through metadata analysis.

Design/methodology/approach

By focussing on the data within a LOD dataset, the authors can infer its structure in a much better way than current approaches, generating more intuitive models to progress toward visual representations.

Findings

With no technical knowledge required, focussing on metadata properties from a semantically annotated dataset could lead to automatically generated charts that allow to understand the dataset in an exploratory manner. Through interactive visualizations, users can navigate LOD sources using a natural approach, in order to save time and resources when dealing with an unknown resource for the first time.

Research limitations/implications

This approach is suitable for available SPARQL endpoints and could be extended for resource description framework dumps loaded locally.

Originality/value

Most works dealing with LOD visualization are customized for a specific domain or dataset. This paper proposes a generic approach based on traditional data visualization and exploratory data analysis literature.

To view the access options for this content please click here
Article
Publication date: 27 September 2019

Chika Saka, Tomoki Oshika and Masayuki Jimichi

This study aims to explore the evidence of the probability of firms’ tax avoidance and the downward convergence trend of national statutory tax rates and firms’ effective…

Abstract

Purpose

This study aims to explore the evidence of the probability of firms’ tax avoidance and the downward convergence trend of national statutory tax rates and firms’ effective tax rates.

Design/methodology/approach

This research employs exploratory data analysis using interactive data manipulation and visualization tools, namely, R with SparkR, dplyr, ggplot2 and googleVis (GeoChart and Motion Chart) packages. This analysis is based on the world-scale accounting data of all listed firms from 148 countries spanning 30 years.

Findings

The results reveal the following: three types of evidences on probability of firms’ tax avoidance, showing a non-random distribution of firms’ effective tax rates and return on assets, cross-sectional variation of firms’ effective tax rates in each country, and the trend of difference between effective tax rates and statutory tax rates, and the downward convergence trend of statutory tax rates and firms’ effective tax rates.

Practical implications

The results highlight the prominent issues of world-scale tax avoidance and tax rate competition and facilitate a collaborative discussion between laymen and professionals using objective evidence.

Originality/value

A novel methodology is adopted through the visualization of world-scale accounting data, which can facilitate a new perspective, revealing unexpected patterns and trends in otherwise hidden information. This study also highlights the importance of global consideration of firms’ tax avoidance and tax rate competition, using objective evidence.

Details

Meditari Accountancy Research, vol. 27 no. 5
Type: Research Article
ISSN: 2049-372X

Keywords

To view the access options for this content please click here
Article
Publication date: 8 April 2019

Violetta Wilk, Geoffrey N. Soutar and Paul Harrigan

This paper aims to offer insights into the ways two computer-aided qualitative data analysis software (CAQDAS) applications (QSR NVivo and Leximancer) can be used to…

Abstract

Purpose

This paper aims to offer insights into the ways two computer-aided qualitative data analysis software (CAQDAS) applications (QSR NVivo and Leximancer) can be used to analyze big, text-based, online data taken from consumer-to-consumer (C2C) social media communication.

Design/methodology/approach

This study used QSR NVivo and Leximancer, to explore 200 discussion threads containing 1,796 posts from forums on an online open community and an online brand community that involved online brand advocacy (OBA). The functionality, in particular, the strengths and weaknesses of both programs are discussed. Examples of the types of analyses each program can undertake and the visual output available are also presented.

Findings

This research found that, while both programs had strengths and weaknesses when working with big, text-based, online data, they complemented each other. Each contributed a different visual and evidence-based perspective; providing a more comprehensive and insightful view of the characteristics unique to OBA.

Research limitations/implications

Qualitative market researchers are offered insights into the advantages and disadvantages of using two different software packages for research projects involving big social media data. The “visual-first” analysis, obtained from both programs can help researchers make sense of such data, particularly in exploratory research.

Practical implications

The paper provides practical recommendations for analysts considering which programs to use when exploring big, text-based, online data.

Originality/value

This paper answered a call to action for further research and demonstration of analytical programs of big, online data from social media C2C communication and makes strong suggestions about the need to examine such data in a number of ways.

Details

Qualitative Market Research: An International Journal, vol. 22 no. 2
Type: Research Article
ISSN: 1352-2752

Keywords

To view the access options for this content please click here
Article
Publication date: 1 February 2002

Cipriano Forza

This paper provides guidelines for the design and execution of survey research in operations management (OM). The specific requirements of survey research aimed at…

Abstract

This paper provides guidelines for the design and execution of survey research in operations management (OM). The specific requirements of survey research aimed at gathering and analysing data for theory testing are contrasted with other types of survey research. The focus is motivated by the need to tackle the various issues which arise in the process of survey research. The paper does not intend to be exhaustive: its aim is to guide the researcher, presenting a systematic picture which synthesises suitable survey practices for research in an OM context. The fundamental aim is to contribute to an increase in the quality of OM research and, as a consequence, to the status of the OM discipline among the scientific community.

Details

International Journal of Operations & Production Management, vol. 22 no. 2
Type: Research Article
ISSN: 0144-3577

Keywords

To view the access options for this content please click here
Case study
Publication date: 28 March 2018

Kavitha Ranganathan

The case is meant to be used in an introductory course on Data Visualization or Analytics in either a business school or any other context where students have had some…

Abstract

The case is meant to be used in an introductory course on Data Visualization or Analytics in either a business school or any other context where students have had some exposure to management topics. This case primarily focuses on introducing students to the basic philosophy and techniques of exploratory data analysis (EDA). The Steaming Mug, a US based hot beverage chain is provided as a context for engaging in a hands-on exploratory data analysis exercise to understand the strengths and weaknesses of the company's operations and performance. The learning from exploring this case will help students understand that many different insights can be drawn from the given data. The students will understand that there is no “one correct path” for this analysis. The values of getting multiple groups to present their findings is that students realise that there are many other angles that could have been explored, than the path they had gone down.

Details

Indian Institute of Management Ahmedabad, vol. no.
Type: Case Study
ISSN: 2633-3260
Published by: Indian Institute of Management Ahmedabad

Keywords

To view the access options for this content please click here
Book part
Publication date: 7 October 2015

Azizah Ahmad

The strategic management literature emphasizes the concept of business intelligence (BI) as an essential competitive tool. Yet the sustainability of the firms’ competitive…

Abstract

The strategic management literature emphasizes the concept of business intelligence (BI) as an essential competitive tool. Yet the sustainability of the firms’ competitive advantage provided by BI capability is not well researched. To fill this gap, this study attempts to develop a model for successful BI deployment and empirically examines the association between BI deployment and sustainable competitive advantage. Taking the telecommunications industry in Malaysia as a case example, the research particularly focuses on the influencing perceptions held by telecommunications decision makers and executives on factors that impact successful BI deployment. The research further investigates the relationship between successful BI deployment and sustainable competitive advantage of the telecommunications organizations. Another important aim of this study is to determine the effect of moderating factors such as organization culture, business strategy, and use of BI tools on BI deployment and the sustainability of firm’s competitive advantage.

This research uses combination of resource-based theory and diffusion of innovation (DOI) theory to examine BI success and its relationship with firm’s sustainability. The research adopts the positivist paradigm and a two-phase sequential mixed method consisting of qualitative and quantitative approaches are employed. A tentative research model is developed first based on extensive literature review. The chapter presents a qualitative field study to fine tune the initial research model. Findings from the qualitative method are also used to develop measures and instruments for the next phase of quantitative method. The study includes a survey study with sample of business analysts and decision makers in telecommunications firms and is analyzed by partial least square-based structural equation modeling.

The findings reveal that some internal resources of the organizations such as BI governance and the perceptions of BI’s characteristics influence the successful deployment of BI. Organizations that practice good BI governance with strong moral and financial support from upper management have an opportunity to realize the dream of having successful BI initiatives in place. The scope of BI governance includes providing sufficient support and commitment in BI funding and implementation, laying out proper BI infrastructure and staffing and establishing a corporate-wide policy and procedures regarding BI. The perceptions about the characteristics of BI such as its relative advantage, complexity, compatibility, and observability are also significant in ensuring BI success. The most important results of this study indicated that with BI successfully deployed, executives would use the knowledge provided for their necessary actions in sustaining the organizations’ competitive advantage in terms of economics, social, and environmental issues.

This study contributes significantly to the existing literature that will assist future BI researchers especially in achieving sustainable competitive advantage. In particular, the model will help practitioners to consider the resources that they are likely to consider when deploying BI. Finally, the applications of this study can be extended through further adaptation in other industries and various geographic contexts.

Details

Sustaining Competitive Advantage Via Business Intelligence, Knowledge Management, and System Dynamics
Type: Book
ISBN: 978-1-78441-764-2

Keywords

To view the access options for this content please click here
Article
Publication date: 17 June 2019

Sarra Berraies

The purpose of this paper is to investigate the links between the enterprise social networks (ESN) use and the exploitative and exploratory innovations and deepen the…

Abstract

Purpose

The purpose of this paper is to investigate the links between the enterprise social networks (ESN) use and the exploitative and exploratory innovations and deepen the analysis by examining the mediating role of the sub-dimensions of intellectual capital (IC) in these relationships.

Design/methodology/approach

The authors use a quantitative method based on the questionnaire administrated to a sample of 248 middle managers working in Tunisian ICT firms. Regarding the data analysis, the authors use a partial least square-structural equation modeling (PLS-SEM) method.

Findings

Results highlight that whereas exploratory innovation is positively linked to human capital (HC) and social capital (SC), exploitative innovation is positively associated with HC. Findings show that the ESN use is linked positively to exploitative innovation and this link is mediated by HC. The data analysis also revealed that HC and SC mediate the link between ESN use and exploratory innovation.

Originality/value

Although limited studies have investigated the effect of the ESN use on firms, this research pioneers the examination of the effect of the ESN use on exploitative and exploratory innovations within ICT firms and the mediating roles of HC, SC and organizational capital that have never been explored. Findings are highlighted along with interesting insights for managers and outline the key aspects related to the ESN use that may improve the sub-dimensions of IC and boost exploitative and exploratory innovations.

Details

Journal of Intellectual Capital, vol. 20 no. 3
Type: Research Article
ISSN: 1469-1930

Keywords

1 – 10 of over 53000