Search results

1 – 10 of over 1000
Article
Publication date: 21 November 2023

Hua Pan and Rong Liu

On the one hand, this paper is to further understand the residents' differentiated power consumption behaviors and tap the residential family characteristics labels from the…

Abstract

Purpose

On the one hand, this paper is to further understand the residents' differentiated power consumption behaviors and tap the residential family characteristics labels from the perspective of electricity stability. On the other hand, this paper is to address the problem of lack of causal relationship in the existing research on the association analysis of residential electricity consumption behavior and basic information data.

Design/methodology/approach

First, the density-based spatial clustering of applications with noise method is used to extract the typical daily load curve of residents. Second, the degree of electricity consumption stability is described from three perspectives: daily minimum load rate, daily load rate and daily load fluctuation rate, and is evaluated comprehensively using the entropy weight method. Finally, residential customer labels are constructed from sociological characteristics, residential characteristics and energy use attitudes, and the enhanced FP-growth algorithm is employed to investigate any potential links between each factor and the stability of electricity consumption.

Findings

Compared with the original FP-growth algorithm, the improved algorithm can realize the excavation of rules containing specific attribute labels, which improves the excavation efficiency. In terms of factors influencing electricity stability, characteristics such as a large number of family members, being well employed, having children in the household and newer dwelling labels may all lead to poorer electricity stability, but residents' attitudes toward energy use and dwelling type are not significantly associated with electricity stability.

Originality/value

This paper aims to uncover household socioeconomic traits that influence the stability of home electricity use and to shed light on the intricate connections between them. Firstly, in this article, from the perspective of electricity stability, the characteristics of the power consumption of residents' users are refined. And the authors use the entropy weight method to comprehensively evaluate the stability of electricity usage. Secondly, the labels of residential users' household characteristics are screened and organized. Finally, the improved FP-growth algorithm is used to mine the residential household characteristic labels that are strongly associated with electricity consumption stability.

Highlights

  1. The stability of electricity consumption is important to the stable operation of the grid.

  2. An improved FP-growth algorithm is employed to explore the influencing factors.

  3. The improved algorithm enables the mining of rules containing specific attribute labels.

  4. Residents' attitudes toward energy use are largely unrelated to the stability of electricity use.

The stability of electricity consumption is important to the stable operation of the grid.

An improved FP-growth algorithm is employed to explore the influencing factors.

The improved algorithm enables the mining of rules containing specific attribute labels.

Residents' attitudes toward energy use are largely unrelated to the stability of electricity use.

Details

Management of Environmental Quality: An International Journal, vol. 35 no. 3
Type: Research Article
ISSN: 1477-7835

Keywords

Article
Publication date: 26 March 2024

Yuanwen Han, Jiang Shen, Xuwei Zhu, Bang An and Xueying Bao

This study aims to develop an interface management risk interaction modeling and analysis methodology applicable to complex systems in high-speed rail construction projects…

Abstract

Purpose

This study aims to develop an interface management risk interaction modeling and analysis methodology applicable to complex systems in high-speed rail construction projects, reveal the interaction mechanism of interface management risk and provide theoretical support for project managers to develop appropriate interface management risk response strategies.

Design/methodology/approach

This paper introduces the association rule mining technique to improve the complex network modeling method. Taking China as an example, based on the stakeholder perspective, the risk factors and significant accident types of interface management of high-speed rail construction projects are systematically identified, and a database is established. Then, the Apriori algorithm is used to mine and analyze the strong association rules among the factors in the database, construct the complex network, and analyze its topological characteristics to reveal the interaction mechanism of the interface management risk of high-speed rail construction projects.

Findings

The results show that the network is both scale-free and small-world, implying that construction accidents are not random events but rather the result of strong interactions between numerous interface management risks. Contractors, technical interfaces, mechanical equipment, and environmental factors are the primary direct causal factors of accidents, while owners and designers are essential indirect causal factors. The global importance of stakeholders such as owners, designers, and supervisors rises significantly after considering the indirect correlations between factors. This theoretically explains the need to consider the interactions between interface management risks.

Originality/value

The interaction mechanism between interface management risks is unclear, which is an essential factor influencing the decision of risk response measures. This study proposes a new methodology for analyzing interface management risk response strategies that incorporate quantitative analysis methods and considers the interaction of interface management risks.

Details

Engineering, Construction and Architectural Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0969-9988

Keywords

Open Access
Article
Publication date: 2 April 2024

Koraljka Golub, Osma Suominen, Ahmed Taiye Mohammed, Harriet Aagaard and Olof Osterman

In order to estimate the value of semi-automated subject indexing in operative library catalogues, the study aimed to investigate five different automated implementations of an…

Abstract

Purpose

In order to estimate the value of semi-automated subject indexing in operative library catalogues, the study aimed to investigate five different automated implementations of an open source software package on a large set of Swedish union catalogue metadata records, with Dewey Decimal Classification (DDC) as the target classification system. It also aimed to contribute to the body of research on aboutness and related challenges in automated subject indexing and evaluation.

Design/methodology/approach

On a sample of over 230,000 records with close to 12,000 distinct DDC classes, an open source tool Annif, developed by the National Library of Finland, was applied in the following implementations: lexical algorithm, support vector classifier, fastText, Omikuji Bonsai and an ensemble approach combing the former four. A qualitative study involving two senior catalogue librarians and three students of library and information studies was also conducted to investigate the value and inter-rater agreement of automatically assigned classes, on a sample of 60 records.

Findings

The best results were achieved using the ensemble approach that achieved 66.82% accuracy on the three-digit DDC classification task. The qualitative study confirmed earlier studies reporting low inter-rater agreement but also pointed to the potential value of automatically assigned classes as additional access points in information retrieval.

Originality/value

The paper presents an extensive study of automated classification in an operative library catalogue, accompanied by a qualitative study of automated classes. It demonstrates the value of applying semi-automated indexing in operative information retrieval systems.

Details

Journal of Documentation, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0022-0418

Keywords

Article
Publication date: 29 January 2024

Kai Wang

The identification of network user relationship in Fancircle contributes to quantifying the violence index of user text, mining the internal correlation of network behaviors among…

Abstract

Purpose

The identification of network user relationship in Fancircle contributes to quantifying the violence index of user text, mining the internal correlation of network behaviors among users, which provides necessary data support for the construction of knowledge graph.

Design/methodology/approach

A correlation identification method based on sentiment analysis (CRDM-SA) is put forward by extracting user semantic information, as well as introducing violent sentiment membership. To be specific, the topic of the implementation of topology mapping in the community can be obtained based on self-built field of violent sentiment dictionary (VSD) by extracting user text information. Afterward, the violence index of the user text is calculated to quantify the fuzzy sentiment representation between the user and the topic. Finally, the multi-granularity violence association rules mining of user text is realized by constructing violence fuzzy concept lattice.

Findings

It is helpful to reveal the internal relationship of online violence under complex network environment. In that case, the sentiment dependence of users can be characterized from a granular perspective.

Originality/value

The membership degree of violent sentiment into user relationship recognition in Fancircle community is introduced, and a text sentiment association recognition method based on VSD is proposed. By calculating the value of violent sentiment in the user text, the annotation of violent sentiment in the topic dimension of the text is achieved, and the partial order relation between fuzzy concepts of violence under the effective confidence threshold is utilized to obtain the association relation.

Details

Data Technologies and Applications, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2514-9288

Keywords

Article
Publication date: 16 April 2024

Amir Schreiber and Ilan Schreiber

In the modern digital realm, while artificial intelligence (AI) technologies pave the way for unprecedented opportunities, they also give rise to intricate cybersecurity issues…

Abstract

Purpose

In the modern digital realm, while artificial intelligence (AI) technologies pave the way for unprecedented opportunities, they also give rise to intricate cybersecurity issues, including threats like deepfakes and unanticipated AI-induced risks. This study aims to address the insufficient exploration of AI cybersecurity awareness in the current literature.

Design/methodology/approach

Using in-depth surveys across varied sectors (N = 150), the authors analyzed the correlation between the absence of AI risk content in organizational cybersecurity awareness programs and its impact on employee awareness.

Findings

A significant AI-risk knowledge void was observed among users: despite frequent interaction with AI tools, a majority remain unaware of specialized AI threats. A pronounced knowledge difference existed between those that are trained in AI risks and those who are not, more apparent among non-technical personnel and sectors managing sensitive information.

Research limitations/implications

This study paves the way for thorough research, allowing for refinement of awareness initiatives tailored to distinct industries.

Practical implications

It is imperative for organizations to emphasize AI risk training, especially among non-technical staff. Industries handling sensitive data should be at the forefront.

Social implications

Ensuring employees are aware of AI-related threats can lead to a safer digital environment for both organizations and society at large, given the pervasive nature of AI in everyday life.

Originality/value

Unlike most of the papers about AI risks, the authors do not trust subjective data from second hand papers, but use objective authentic data from the authors’ own up-to-date anonymous survey.

Details

Information & Computer Security, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2056-4961

Keywords

Case study
Publication date: 27 October 2023

Joe Anderson, Mahendra Joshi and Susan K. Williams

This compact case provides a relatively large data set that students explore using visualization and a Tableau dynamic dashboard that they create. Students were asked to describe…

Abstract

Theoretical basis

This compact case provides a relatively large data set that students explore using visualization and a Tableau dynamic dashboard that they create. Students were asked to describe what the data set contained in relation to employee attrition experience of Baca Beverage Distributors (BBD). The application and managerial questions are set in human resources and a company that is facing high attrition during the pandemic.

Research methodology

BBD shared their data and problem scenario for this compact case. The protagonist, Morgan Matthews, was the authors’ contact and provided significant clarification and guidance about the data. Both the company and the protagonist have been disguised. Some of the job positions have been rephrased. All names of employees, supervisors and managers have been replaced with codes.

Case overview/synopsis

During the 2020–2022 pandemic years, BBD experienced, like many companies, a higher than usual employee turnover rate and Morgan Matthews, Director of People, was concerned. Not only was it time-consuming, expensive and disruptive but the company had prided itself on being a good place to work. Were they hiring the right people, people that fit the company culture and people that fit the positions for which they were hired? The company had been using the Predictive Index [1] when on-boarding employees. In addition, there were results from self-reviews and manager reviews that could be used. Morgan wondered if data visualization and visual analytics would be useful in describing their employees and whether it would reveal any opportunities to improve the turnover rate. Before seeking a solution for the high turnover, it was important to step back and learn what the data said about who was leaving and the reasons they gave for leaving.

Complexity academic level

This compact case can be used in courses that include visualization using Tableau and dashboards. As it is a compact case, it requires less preparation time from the students and less class time for discussion. The case is for students who have been recently introduced to business analytics, specifically visualization and data storytelling with Tableau. For this reason, significant guidance has been provided in the case assignment. The level of the case can be adjusted by the amount of guidance provided in the case assignment. Courses include introduction to business analytics, descriptive analytics and visualization, communication through data storytelling. The case can be used for all modalities – in person, hybrid, online. The authors use it here for visualization and dynamic dashboards but using the same data set and compact case description, exploratory data analysis could be assigned.

Supplementary material

Supplementary material for this article can be found online.

Article
Publication date: 23 October 2023

Mariam Bader, Jiju Antony, Raja Jayaraman, Vikas Swarnakar, Ravindra S. Goonetilleke, Maher Maalouf, Jose Arturo Garza-Reyes and Kevin Linderman

The purpose of this study is to examine the critical failure factors (CFFs) linked to various types of process improvement (PI) projects such as Kaizen, Lean, Six Sigma, Lean Six…

Abstract

Purpose

The purpose of this study is to examine the critical failure factors (CFFs) linked to various types of process improvement (PI) projects such as Kaizen, Lean, Six Sigma, Lean Six Sigma and Agile. Proposing a mitigation framework accordingly is also an aim of this study.

Design/methodology/approach

This research undertakes a systematic literature review of 49 papers that were relevant to the scope of the study and that were published in four prominent databases, including Google Scholar, Scopus, Web of Science and EBSCO.

Findings

Further analysis identifies 39 factors that contribute to the failure of PI projects. Among these factors, significant emphasis is placed on issues such as “resistance to cultural change,” “insufficient support from top management,” “inadequate training and education,” “poor communication” and “lack of resources,” as primary causes of PI project failures. To address and overcome the PI project failures, the authors propose a framework for failure mitigation based on change management models. The authors present future research directions that aim to enhance both the theoretical understanding and practical aspects of PI project failures.

Practical implications

Through this study, researchers and project managers can benefit from well-structured guidelines and invaluable insights that will help them identify and address potential failures, leading to successful implementation and sustainable improvements within organizations.

Originality/value

To the best of the author’s knowledge, this paper is the first study of its kind to examine the CFFs of five PI methodologies and introduces a novel approach derived from change management theory as a solution to minimize the risk associated with PI failure.

Details

International Journal of Lean Six Sigma, vol. 15 no. 3
Type: Research Article
ISSN: 2040-4166

Keywords

Article
Publication date: 20 September 2023

Yizhi Liu, Yi Fu, Zihan Liang and Yu Liu

This study aims to investigate the factors that affect the intention to use public mobile libraries and enhance the quality of mobile library services to attract and retain users.

Abstract

Purpose

This study aims to investigate the factors that affect the intention to use public mobile libraries and enhance the quality of mobile library services to attract and retain users.

Design/methodology/approach

A questionnaire survey was conducted with 391 valid users in China. Based on the stimulus–response theory and user individual characteristics, a model was developed to examine the factors influencing the intention to use public mobile libraries. The model was tested using statistical software, such as SPSS 25.0 and AMOS 24.0.

Findings

The results indicate that technological factors, content factors, individual factors and psychological factors significantly influence the intention to use public mobile libraries. The impact of system quality and perceived ease of use in technological factors is relatively balanced. Among content factors, information quality is the most significant, while information literacy has a greater influence compared to subjective norms in individual factors. In psychological factors, perceived matching and perceived pleasure both positively influence usage intention, while perceived cost has a negative impact.

Research limitations/implications

Firstly, this study only investigates users’ intention to use, but intention does not necessarily equate to actual usage behaviour (King and He,2006). Future research can introduce new variables to explore users’ adoption and continuous usage behaviours. Secondly, this study does not differentiate between different types of mobile library users. Future research can consider different user types, such as potential users and current users, to investigate the similarities and differences in their willingness to adopt mobile library services. Thirdly, this study is primarily cross-sectional. Future research can consider longitudinal studies to provide more in-depth insights into user behaviour.

Practical implications

This paper identifies external and internal stimulus factors and conducts a comprehensive investigation into the factors influencing the intention to use public mobile libraries, thus providing generalizable research findings. Unlike previous studies, this research introduces the information literacy variable, enriching the model of factors affecting users' intention to use mobile libraries and yielding more comprehensive conclusions. Consequently, the study aims to be grounded in the actual usage ideas and intentions of diverse user groups, constructing a model that highlights factors influencing the intention to use public mobile library services.

Social implications

From a social perspective, this study offers four implications for improving the utilization of public mobile libraries. Firstly, it is crucial to integrate digital resources, enhance information quality in public mobile libraries and improve platform usability. Secondly, adopting a user-oriented approach is essential to improve the service level of public mobile libraries and stimulate residents’ participation. Thirdly, efforts should be made to strengthen user information literacy and increase information utilization. Fourthly, top-level design improvements, effective promotion efforts and user behaviour guidance are essential for the success of public mobile libraries.

Originality/value

This study contributes to the improvement of public mobile library services and the advancement of modern public cultural services by identifying the key factors that drive the intention to use such services. The findings have practical implications for promoting high-quality development and enhancing the popularity of public mobile libraries.

Details

The Electronic Library , vol. 42 no. 1
Type: Research Article
ISSN: 0264-0473

Keywords

Article
Publication date: 8 April 2024

Lies Bouten and Sophie Hoozée

This study examines how assurors make sense of sustainability assurance (SA) work and how interactions with assurance team members and clients shape assurors’ sensemaking and…

Abstract

Purpose

This study examines how assurors make sense of sustainability assurance (SA) work and how interactions with assurance team members and clients shape assurors’ sensemaking and their actual SA work.

Design/methodology/approach

To obtain detailed accounts of how SA work occurs on the ground, this study explores three SA engagements by interviewing the main actors involved, both at the client firms and at their Big Four assurance providers.

Findings

Individual assurors’ (i.e. partners and other team members) sensemaking of SA work results in the crafting of their logics of action (LoAs), that is, their meanings about the objectives of SA work and how to conduct it. Without organizational socialization, team members may not arrive at shared meanings and deviate from the team-wide assurance approach. To fulfill their objectives for SA work, assurors may engage in socialization with clients or assume a temporary role. Yet, the role negotiations taking place in the shadows of the scope negotiations determine their default role during the engagement.

Practical implications

Two options are available to help SA statement users gauge the relevance of SA work: either displaying the SA work performed or making it more uniform.

Originality/value

This study theoretically grounds how assurors make sense of SA work and documents how (the lack of) professional socialization, organizational socialization and socialization of frequent interaction partners at the client shape actual SA work. Thereby, it unravels the SA work concealed behind SA statements.

Details

Accounting, Auditing & Accountability Journal, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0951-3574

Keywords

Article
Publication date: 26 April 2024

Wenjing Guo, Yuan Jiang, Wei Zhang and Haizhen Wang

Research on the effects of feedback frequency has reported mixed findings. To tackle this problem, the current study focuses on specific feedback signs (i.e. negative feedback)…

Abstract

Purpose

Research on the effects of feedback frequency has reported mixed findings. To tackle this problem, the current study focuses on specific feedback signs (i.e. negative feedback). By integrating the face management theory and attribution theory, this study examined the mediating effect of trust in supervisors and the moderating effect of employee-attributed performance promotion motives for negative feedback.

Design/methodology/approach

A field study with 176 participants and two supplemental experiments with 143 and 100 participants, respectively, were conducted to test the theoretical model.

Findings

Results revealed that the frequency of supervisory negative feedback negatively influenced employees’ trust in supervisors, which in turn influenced employees’ perceptions of feedback utility and learning performance. These indirect effects can be alleviated when employees have high degrees of performance promotion attribution for supervisor motives.

Originality/value

This research extends feedback research by integrating feedback frequency with a specific sign of feedback and revealing a moderated mediation effect of the negative feedback frequency.

Details

Leadership & Organization Development Journal, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0143-7739

Keywords

1 – 10 of over 1000