Search results
1 – 10 of 46This study aims to improve the reliability of emergency safety barriers by using the subjective safety analysis based on evidential reasoning theory in order to develop on a…
Abstract
Purpose
This study aims to improve the reliability of emergency safety barriers by using the subjective safety analysis based on evidential reasoning theory in order to develop on a framework for optimizing the reliability of emergency safety barriers.
Design/methodology/approach
The emergency event tree analysis is combined with an interval type-2 fuzzy-set and analytic hierarchy process (AHP) method. In order to the quantitative data is not available, this study based on interval type2 fuzzy set theory, trapezoidal fuzzy numbers describe the expert's imprecise uncertainty about the fuzzy failure probability of emergency safety barriers related to the liquefied petroleum gas storage prevent. Fuzzy fault tree analysis and fuzzy ordered weighted average aggregation are used to address uncertainties in emergency safety barrier reliability assessment. In addition, a critical analysis and some corrective actions are suggested to identify weak points in emergency safety barriers. Therefore, a framework decisions are proposed to optimize and improve safety barrier reliability. Decision-making in this framework uses evidential reasoning theory to identify corrective actions that can optimize reliability based on subjective safety analysis.
Findings
A real case study of a liquefied petroleum gas storage in Algeria is presented to demonstrate the effectiveness of the proposed methodology. The results show that the proposed methodology provides the possibility to evaluate the values of the fuzzy failure probability of emergency safety barriers. In addition, the fuzzy failure probabilities using the fuzzy type-2 AHP method are the most reliable and accurate. As a result, the improved fault tree analysis can estimate uncertain expert opinion weights, identify and evaluate failure probability values for critical basic event. Therefore, suggestions for corrective measures to reduce the failure probability of the fire-fighting system are provided. The obtained results show that of the ten proposed corrective actions, the corrective action “use of periodic maintenance tests” prioritizes reliability, optimization and improvement of safety procedures.
Research limitations/implications
This study helps to determine the safest and most reliable corrective measures to improve the reliability of safety barriers. In addition, it also helps to protect people inside and outside the company from all kinds of major industrial accidents. Among the limitations of this study is that the cost of corrective actions is not taken into account.
Originality/value
Our contribution is to propose an integrated approach that uses interval type-2 fuzzy sets and AHP method and emergency event tree analysis to handle uncertainty in the failure probability assessment of emergency safety barriers. In addition, the integration of fault tree analysis and fuzzy ordered averaging aggregation helps to improve the reliability of the fire-fighting system and optimize the corrective actions that can improve the safety practices in liquefied petroleum gas storage tanks.
Details
Keywords
Christophe Haag and Marion Wolff
Little is known about what emotionally un(intelligent) CEOs really say to their close collaborators within the boardroom. Would the rhetoric content differ between an emotionally…
Abstract
Purpose
Little is known about what emotionally un(intelligent) CEOs really say to their close collaborators within the boardroom. Would the rhetoric content differ between an emotionally intelligent and an emotionally unintelligent CEO, especially during a crisis? This chapter aims to answer this question.
Study Design/Methodology/Approach
40 CEOs of large corporations were asked to deliver a verbal address to their board members in reaction to a vignette describing a critical situation for the company. Participants were provided with the Schutte self-report emotional intelligence (EI) test. The verbal content of CEOs' closed-door discourses was analyzed using Cognitive-Discursive Analysis (CDA) and, subsequently, Geometric Data Analysis (GDA).
Findings
The results revealed that CEOs with low EI tend to evoke unpleasant emotions, talk about competition, and often blame some – or all – of the board members for their (poor) actions in comparison to CEOs with high or medium EI. In contrast, CEOs with high EI tend to use terms in relation to decision or realization and appear to be more cooperative than those with lower EI and were also ready to make decisions on behalf of team.
Originality/Value
Previous research has mainly focused on CEOs' public speeches. But the content of CEOs' speeches within the boardroom might noticeably differ from what they would say in a public address. The results of our exploratory study can serve CEOs as a basis toward improving their closed-door rhetoric during a crisis.
Research Limitations
It would be interesting to enlarge the size of our population in order to strengthen our statistical analyses as well as explore other cultural and linguistic environments and other channels through which emotions can be expressed (e.g., human face, gesture, vocal tone).
Details
Keywords
Anuradha Yadav, Rajesh Kumar Singh, Ruchi Mishra and Surajit Bag
With gaining popularity, online communities are increasing. It is leading to the data and information overflow. So, there are some challenges like cyber frauds, cyberbullying…
Abstract
Purpose
With gaining popularity, online communities are increasing. It is leading to the data and information overflow. So, there are some challenges like cyber frauds, cyberbullying, etc. while engaging with online communities. Not only this, anonymity of the participants, stress and racism are also big challenges in online communities' interaction. Online harassers' attack tactics have changed over time. In addition, there are challenges like quality of discussion, inequality in participation of the users, etc. may scale online communities towards incitement and activism. Therefore, this study will try to analyse these challenges for overall benefit of the society.
Design/methodology/approach
The underlying fuzzy set theory is employed to handle the fuzziness of users' perceptions since the attributes are expressed in linguistic preferences. Through exhaustive literature review, the authors have identified 15 challenges. These challenges are further categorised as cause and effect by using DEMATEL (Decision-Making Trial and Evaluation Laboratory) approach.
Findings
Lack of strategic planning and uninspired discussions between users has emerged as a major challenge in cause category. This study further demonstrates how individual challenge can be managed and developed to navigate the online communities to maintain a healthy environment in society.
Research limitations/implications
Results are based on limited dataset. Therefore, findings cannot be generalised for all online communities.
Originality/value
The research findings offer a suitable direction to policymakers to formulate and design policies, laws and regulations to increase user engagement in the online community. The study is beneficial to firms and researchers in understanding the factors influencing effective management of online communities.
Details
Keywords
Yu Wang, Daqing Zheng and Yulin Fang
The advancement of enterprise social networks (ESNs) facilitates information sharing but also presents the challenge of managing information boundaries. This study aims to explore…
Abstract
Purpose
The advancement of enterprise social networks (ESNs) facilitates information sharing but also presents the challenge of managing information boundaries. This study aims to explore the factors that influence the information-control behavior of ESN users when continuously sharing information.
Design/methodology/approach
This study specifies the information-control behaviors in the “wall posts” channel and applies communication privacy management (CPM) theory to analyze the effects of the individual-specific factor (disposition to value information), context-specific factors (work-relatedness and information richness) and risk-benefit ratio (public benefit and public risk). Data on actual information-control behaviors extracted from ESN logs are examined using multilevel mixed-effects logistic regression analysis.
Findings
The study's findings show the direct effects of the individual-specific factor, context-specific factors and risk-benefit ratio, highlighting interactions between the individual motivation factor and ESN context factors.
Originality/value
This study reshapes the relationship of CPM theory boundary rules in the ESN context, extending information-control research and providing insights into ESNs' information-control practices.
Details
Keywords
George Okechukwu Onatu, Wellington Didibhuku Thwala and Clinton Ohis Aigbavboa
Dereje Amene Yimam and Nathalie Holvoet
The purpose of this study is to identify the most vulnerable households and districts in Northwest Ethiopia and help decision-makers in developing and prioritising effective…
Abstract
Purpose
The purpose of this study is to identify the most vulnerable households and districts in Northwest Ethiopia and help decision-makers in developing and prioritising effective adaptive strategies and actions.
Design/methodology/approach
A multi-scale analytical tool and hazard-generic socio-economic indicators were developed to identify and prioritise the most vulnerable households and districts in Northwest Ethiopia. Categorical principal component analysis with 36 indicators was used to develop weights for different indicators and construct a household intrinsic vulnerability index. Data were collected through key information interviews, focus group discussions and a household survey with 1,602 randomly selected households in three districts of Northwest Ethiopia.
Findings
Drawing on intrinsic vulnerability index computation, this study highlights that low levels of education, low access to climate information and credit services, long distance travelled to fetch water and frequent food shortages are the dominant factors contributing to high levels of intrinsic vulnerability at district level, while lack of livelihood support and income diversification are the key drivers of vulnerability at household level. The findings of this study further show that the majority of households (78.01%) falls within the very high to moderately high vulnerable category. Disaggregating the data according to agro-climatic zones highlights that the prevalence of high intrinsic vulnerability is most widespread in the lowland agro-climatic zone (82.64%), followed by the highland (81.97%) and midland zones (69.40%).
Practical implications
From a policy intervention vantage point, addressing the drivers of vulnerability provides a reliable approach to reduce the current vulnerability level and manage potential climate change-induced risks of a system. Specifically, reliable information on inherent vulnerability will assist policymakers in developing policies and prioritising actions aimed at reducing vulnerability and assisting in the rational distribution of resources among households at a local level.
Originality/value
This study contributes to the existing vulnerability literature by showing how hazard-generic socio-economic indicators in the vulnerability assessment adopted by the IPCC (2014) are important to identify drives of vulnerability which ultimately may feed into a more fundamental treatment of vulnerability.
Details
Keywords
Mahsa Kamalipoor, Morteza Akbari, Seyed Reza Hejazi and Alireza Nazarian
COVID-19 has affected most business activities, including technology-based business. The higher the business vulnerability rating, the greater the impacts. After identifying three…
Abstract
Purpose
COVID-19 has affected most business activities, including technology-based business. The higher the business vulnerability rating, the greater the impacts. After identifying three dimensions of vulnerability (exposure, business sensitivity and response capacity), this study aims to determine the potential components and indicators of the vulnerability of technology-based businesses.
Design/methodology/approach
Using the indicator approach, a comprehensive vulnerability model was developed for assessing the vulnerability of the technology-based business against COVID-19.
Findings
In this study, COVID-19, as a biological threat and an exogenous shock, was considered the exposure dimension. Business characteristics, job characteristics, business owner-manager demographics, product and supplier characteristics were identified as the sensitivity dimension, while resources, human capital, technological capitals, social capitals, institutional capitals, infrastructures, management capacity and supply chain capabilities were defined as the adaptive business capability or response capacity. To determine vulnerability and response capacity against exogenous shocks and a pandemic crisis, the framework can act as a useful checklist for managers and owners of technology-based businesses.
Originality/value
Research on the COVID-19, especially in the technology-based business, is still at the emergent stage. This study is a pioneering effort to review the literature on business vulnerability and provide a framework to reduce business vulnerability using the indicator-based approach.
Details
Keywords
Qi Zhang, Xingshan Zheng, Yao Yao and Francisca N.M. Dube
Building on the person–supervisor fit theory, this paper examines how and when leader–follower moqi congruence positively impacts task performance.
Abstract
Purpose
Building on the person–supervisor fit theory, this paper examines how and when leader–follower moqi congruence positively impacts task performance.
Design/methodology/approach
With data collected from 174 leader–follower dyads in 41 project teams in Shanghai, China, the authors use polynomial regression and response surface plots to test the hypotheses on the effects of leader–follower moqi congruence.
Findings
Leader–follower moqi congruence positively affects followers' task performance, mediated by coordination. Task coordination was of higher quality when the congruence is achieved at a high level of moqi than at a low level. The effect of leader–follower moqi congruence on task performance (mediated by coordination) was weaker when leader-member exchange was low than when it was high.
Originality/value
This study identifies why leader–follower moqi can improve coordination and task performance. It extends person–supervisor fit theory and is an enhancement for moqi research and practice.
Details
Keywords
The purpose of this study is to assess how intergovernmental panel on climate change’s (IPCC’s) sixth assessment report of Working Group I (WGI), a Summary for Policymakers (SPM)…
Abstract
Purpose
The purpose of this study is to assess how intergovernmental panel on climate change’s (IPCC’s) sixth assessment report of Working Group I (WGI), a Summary for Policymakers (SPM), has evaluated the current climate change situation. The author uses the qualitative content analysis (QCA) method (i.e. summative content analysis [SCA]) to identify critical points of the SPM.
Design/methodology/approach
To better understand the WGI report and its SPM, the author uses the thematic analysis, often called the QCA method. This study takes more steps and uses one of the main qualitative content analysis approaches (i.e. SCA). Therefore, QCA (SCA) can help the author count the occurrence of certain words using computer-assisted qualitative data analysis software that quantifies the words in the data. This process helps the author to understand codes and patterns (e.g. the concept in the results section).
Findings
Interestingly, the AR6 says more about adaptation for policy makers in sections C (Climate information for risk assessment) and D (Mitigation of future climate change) than in sections A and D. Finally, this study concludes that the IPCC WGI SPM has addressed evidence on global climate change policymaking for SPMa, SPMd (mitigation-based strategies and mitigation policy [MP]) and SPMb, SPMc (adaptation policy and adaptation-based strategy).
Research limitations/implications
First, this study refers only to the contribution of WGI, a SPM. The findings of this study do not necessarily provide a full understanding of what the AR6 WGI SPM says about climate change. It points out that the QDA Miner software and Voyant tool do not include all variables and examples where mitigation and adaptation-based strategies are discussed. The guidance for coding is based on the approved version of IPCC AR6 WGI SPM. The final limitation is that the relatedness of key words (e.g. confidence, high and warming) is sometimes ambiguous; even experts may disagree on how the words are linked to form a concept. Thus, this method works at the keyword level. A more intelligent method would use more meaningful information than keywords.
Originality/value
This study used qualitative data analysis (SCA) to explore what was said about climate change in four sections of the IPCC AR6 WGI SPM, which may influence current and future global climate change policymaking.
Details