Search results

1 – 10 of over 5000
To view the access options for this content please click here
Book part
Publication date: 13 March 2018

Kate Pangbourne, Dominic Stead, Miloš Mladenović and Dimitris Milakis

This chapter provides a reflective critique of Mobility as a Service (MaaS), an emerging development seeking a role within the Smart Mobility paradigm. We assess a range…

Abstract

This chapter provides a reflective critique of Mobility as a Service (MaaS), an emerging development seeking a role within the Smart Mobility paradigm. We assess a range of its future implications for urban policymakers in terms of governance and sustainability (i.e., social and environmental impacts). We begin by describing the origins of the MaaS concept, along with the features of precursor technologies and current early examples. We then reflect on the marketing of MaaS and use it to consider how we might anticipate some potentially less desirable aspects of the promoted business models. Finally, we discuss the implications for governance.

Details

Governance of the Smart Mobility Transition
Type: Book
ISBN: 978-1-78754-317-1

Keywords

Content available
Article
Publication date: 23 July 2021

Brenda Nansubuga and Christian Kowalkowski

Following the recent surge in research on carsharing, the paper synthesizes this growing literature to provide a comprehensive understanding of the current state of…

Abstract

Purpose

Following the recent surge in research on carsharing, the paper synthesizes this growing literature to provide a comprehensive understanding of the current state of research and to identify directions for future work. Specifically, this study details implications for service theory and practice.

Design/methodology/approach

Systematic selection and analysis of 279 papers from the existing literature, published between 1996 and 2020.

Findings

The literature review identified four key themes: business models, drivers and barriers, customer behavior, and vehicle balancing.

Practical implications

For managers, the study illuminates the importance of collaboration among stakeholders within the automotive sector for purposes of widening their customer base and maximizing utilization and profits. For policy makers, their important role in supporting carsharing take-off is highlighted with emphasis on balancing support rendered to different mobility services to promote mutual success.

Originality/value

This is the first systematic multi-disciplinary literature review of carsharing. It integrates insights from transportation, environmental, and business studies, identifying gaps in the existing research and specifically suggesting implications for service research.

Details

Journal of Service Management, vol. 32 no. 6
Type: Research Article
ISSN: 1757-5818

Keywords

To view the access options for this content please click here
Book part
Publication date: 13 August 2020

Claus Hedegaard Sørensen and Alexander Paulsson

In this chapter, the authors will summarise the entire book and look ahead. The aim of this book has been to take the calls for governance of smart mobility one step…

Abstract

In this chapter, the authors will summarise the entire book and look ahead. The aim of this book has been to take the calls for governance of smart mobility one step further by analysing and discussing current and future policy instruments to govern smart mobility. The task has been carried out by discussing the why, how and what of policy instruments. So far, the policy instruments governing smart mobility to a large extent are focussed on understanding this new field of mobility, establishing relations and roles between companies and authorities, and making the field governable. What is lacking in this equation are policy instruments that establish the population as citizens with rights, voices and roles. In order to align the smart mobility transition and the transition towards a sustainable society, the authors consider the development of deliberative citizen participation an important initiative and the authors suggest it as an important field for future research.

Details

Shaping Smart Mobility Futures: Governance and Policy Instruments in times of Sustainability Transitions
Type: Book
ISBN: 978-1-83982-651-1

Keywords

To view the access options for this content please click here
Article
Publication date: 14 October 2020

Saurabh Kumar, Baidyanath Biswas, Manjot Singh Bhatia and Manoj Dora

The present study aims to identify and investigate the antecedents of enhanced level of cyber-security at the organisational level from both the technical and the human…

Abstract

Purpose

The present study aims to identify and investigate the antecedents of enhanced level of cyber-security at the organisational level from both the technical and the human resource perspective using human–organisation–technology (HOT) theory.

Design/methodology/approach

The study has been conducted on 151 professionals who have expertise in dealing with cyber-security in organisations in sectors such as retail, education, healthcare, etc. in India. The analysis of the data is carried out using partial least squares based structural equation modelling technique (PLS-SEM).

Findings

The results from the study suggest that “legal consequences” and “technical measures” adopted for securing cyber-security in organisations are the most important antecedents for enhanced cyber-security levels in the organisations. The other significant antecedents for enhanced cyber-security in organisations include “role of senior management” and “proactive information security”.

Research limitations/implications

This empirical study has significant implications for organisations as they can take pre-emptive measures by focussing on important antecedents and work towards enhancing the level of cyber-security.

Originality/value

The originality of this research is combining both technical and human resource perspective in identifying the determinants of enhanced level of cyber-security in the organisations.

Details

Journal of Enterprise Information Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1741-0398

Keywords

To view the access options for this content please click here
Article
Publication date: 8 June 2015

Sushma Mishra

The purpose of this study is to develop theoretically grounded and empirically derived organizational security governance (OSG) objectives. Developing organizational…

Abstract

Purpose

The purpose of this study is to develop theoretically grounded and empirically derived organizational security governance (OSG) objectives. Developing organizational security governance (OSG) objectives pose significant challenges for organizations considering the ever-increasing vulnerability from lack of or misuse of appropriate controls. In recent years, there have been several cases of colossal losses to businesses due to inadequate security governance measure. In many cases, organizations do not even know as to what their ISG objectives might be. Following an extensive empirical study, this paper proposes 6 fundamental and 17 means objectives for designing security governance. The objectives were developed from individual values of information technology and security executives across a wide range of firms. The study comprised 52 interview respondents across 9 firms, which resulted in 23 OSG objectives. Theoretically, the study was grounded in Catton’s (1959) value theory and Keeney’s (1992) value-focused thinking. The objectives provide a useful basis for strategic planning for information security governance.

Design/methodology/approach

This research is grounded in value-focused thinking methodology. Step 1: develop a comprehensive list of personal values underlying the problem being explored. The researcher undertakes extensive interviews, using relevant probes, to elicit underlying values of respondents. Step 2: change the values enlisted to a common form and convert them into objectives. The data collected in Step 1 is collated and presented in a common form, which enables cross-comparison and easy interpretation. Step 3: classify the objectives as means and fundamental for the decision context. Objectives are clustered into groups and then classified into fundamental and means.

Findings

This study uses a value-focused approach to develop OSG objectives. Incorporating individual values in developing governance objectives would facilitate alignment of individual and organizational values about OSG. This study proposes 6 fundamental and 17 means objectives for OSG. The study provides a comprehensive list of OSG that is rooted in values of stakeholders in an organization.

Originality/value

The main contributions study can be classified in two categories. First, it represents a collective set of OSG objectives which touch upon technical, formal, informal, moral and ethical dimensions of governance. This is a unique, synthesized and cohesive framework for OSG, which incorporates several aspects of OSG into one platform, thus allowing the development of a comprehensive security management program. Second, some of the objectives developed in this research (“establish corporate control strategy”, “establish punitive structure”, “establish clear control development process”, “ensure formal control assessment functionality” and “maximize group cohesiveness”) have not been emphasized enough in security governance literature.

Details

Information & Computer Security, vol. 23 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

To view the access options for this content please click here
Article
Publication date: 1 February 1991

A.K. Bhattamishra, G.S. Mishra and M.K. Banerjee

Iron and silicon are the two inherent impurities present in commercial aluminium which impair its corrosion resistance. Influence of silicon/iron ratio present in…

Abstract

Iron and silicon are the two inherent impurities present in commercial aluminium which impair its corrosion resistance. Influence of silicon/iron ratio present in aluminium alloys containing different amounts of silicon has been studied through electrochemical polarization in some inorganic and organic acids (0.1 N). It has been observed that Si/Fe ratio has potential role on corrosion rates in different acids studied.

Details

Anti-Corrosion Methods and Materials, vol. 38 no. 2
Type: Research Article
ISSN: 0003-5599

To view the access options for this content please click here
Article
Publication date: 11 November 2014

Benedikt Lebek, Jörg Uffen, Markus Neumann, Bernd Hohler and Michael H. Breitner

This paper aims to provide an overview of theories used in the field of employees’ information systems (IS) security behavior over the past decade. Research gaps and…

Abstract

Purpose

This paper aims to provide an overview of theories used in the field of employees’ information systems (IS) security behavior over the past decade. Research gaps and implications for future research are worked out by analyzing and synthesizing existing literature.

Design/methodology/approach

This paper presents the results of a literature review comprising 113 publications. The literature review was designed to identify applied theories and to understand the cognitive determinants in the research field. A meta-model that explains employees’ IS security behavior is introduced by assembling the core constructs of the used theories.

Findings

The paper identified 54 used theories, but four behavioral theories were primarily used: Theory of Planned Behavior (TPB), General Deterrence Theory (GDT), Protection Motivation Theory (PMT) and Technology Acceptance Model (TAM). By synthesizing results of empirically tested research models, a survey of factors proven to have a significant influence on employees’ security behavior is presented.

Research limitations/implications

Some relevant publications might be missing within this literature review due to the selection of search terms and/or databases. However, by conduction a forward and a backward search, this paper has limited this error source to a minimum.

Practical implications

This study presents an overview of determinants that have been proven to influence employees’ behavioral intention. Based thereon, concrete training and awareness measures can be developed. This is valuable for practitioners in the process of designing Security Education, Training and Awareness (SETA) programs.

Originality/value

This paper presents a comprehensive up-to-date overview of existing academic literature in the field of employees’ security awareness and behavior research. Based on a developed meta-model, research gaps are identified and implications for future research are worked out.

Details

Management Research Review, vol. 37 no. 12
Type: Research Article
ISSN: 2040-8269

Keywords

To view the access options for this content please click here
Article
Publication date: 1 January 2006

D. Bhatia, P.C. Sarkar and M. Alam

To determine molecular level changes occurring in lac resin, due to the effect of thermal stress at different levels of temperature and baking times.

Abstract

Purpose

To determine molecular level changes occurring in lac resin, due to the effect of thermal stress at different levels of temperature and baking times.

Design/methodology/approach

Films of lac resin were applied on tin panels and baked at 100 and 200°C for different time intervals. The baked films were examined by specular reflectance spectroscopy, as they were otherwise difficult to examine through conventional IR techniques, using KBr pellet method. The results obtained were compared and correlated with work reported by earlier authors using wet chemical methods.

Findings

No significant spectroscopic change was observed on heating lac resin films at 100°C for different time intervals, as compared to air‐dried (parent) lac films. However, it was observed that when the films were baked at 200°C, the spectroscopic data indicated anhydride formation in the oligomers, due to heating effects.

Research limitations/implications

Chemical researches on lac resin have been typically limited by lack of modern tools, due to the difficult and unique nature of the material. The present method to determine molecular level changes in lac due to heating effects, using state‐of‐art instrumentation and computational technique opens a new vista in this field of research.

Practical implications

Lac resin still has a significant place in the surface coating industry, typically in food applications, insulating vanishes, etc. The results obtained indicate that lac‐based baking compositions, when baked at 200°C, exhibit improved characteristics, in terms of adhesion, scratch hardness and even acid resistance. Such an improvement can be attributed unequivocally to the formation of anhydride linkage as evident from spectroscopic data.

Originality/value

As of now, there is no report of specular reflectance data on lac resin and its derivatives. This paper represents the first attempt to obtain and correlate reflectance data on lac. It also highlights the convenience of the method and the scope of sophisticated data analysis, using computational methods.

Details

Pigment & Resin Technology, vol. 35 no. 1
Type: Research Article
ISSN: 0369-9420

Keywords

To view the access options for this content please click here
Article
Publication date: 10 February 2021

Sathies Kumar Thangarajan and Arun Chokkalingam

The purpose of this paper is to develop an efficient brain tumor detection model using the beneficial concept of hybrid classification using magnetic resonance imaging…

Abstract

Purpose

The purpose of this paper is to develop an efficient brain tumor detection model using the beneficial concept of hybrid classification using magnetic resonance imaging (MRI) images Brain tumors are the most familiar and destructive disease, resulting to a very short life expectancy in their highest grade. The knowledge and the sudden progression in the area of brain imaging technologies have perpetually ready for an essential role in evaluating and concentrating the novel perceptions of brain anatomy and operations. The system of image processing has prevalent usage in the part of medical science for enhancing the early diagnosis and treatment phases.

Design/methodology/approach

The proposed detection model involves five main phases, namely, image pre-processing, tumor segmentation, feature extraction, third-level discrete wavelet transform (DWT) extraction and detection. Initially, the input MRI image is subjected to pre-processing using different steps called image scaling, entropy-based trilateral filtering and skull stripping. Image scaling is used to resize the image, entropy-based trilateral filtering extends to eradicate the noise from the digital image. Moreover, skull stripping is done by Otsu thresholding. Next to the pre-processing, tumor segmentation is performed by the fuzzy centroid-based region growing algorithm. Once the tumor is segmented from the input MRI image, feature extraction is done, which focuses on the first-order and higher-order statistical measures. In the detection side, a hybrid classifier with the merging of neural network (NN) and convolutional neural network (CNN) is adopted. Here, NN takes the first-order and higher-order statistical measures as input, whereas CNN takes the third level DWT image as input. As an improvement, the number of hidden neurons of both NN and CNN is optimized by a novel meta-heuristic algorithm called Crossover Operated Rooster-based Chicken Swarm Optimization (COR-CSO). The AND operation of outcomes obtained from both optimized NN and CNN categorizes the input image into two classes such as normal and abnormal. Finally, a valuable performance evaluation will prove that the performance of the proposed model is quite good over the entire existing model.

Findings

From the experimental results, the accuracy of the suggested COR-CSO-NN + CNN was seemed to be 18% superior to support vector machine, 11.3% superior to NN, 22.9% superior to deep belief network, 15.6% superior to CNN and 13.4% superior to NN + CNN, 11.3% superior to particle swarm optimization-NN + CNN, 9.2% superior to grey wolf optimization-NN + CNN, 5.3% superior to whale optimization algorithm-NN + CNN and 3.5% superior to CSO-NN + CNN. Finally, it was concluded that the suggested model is superior in detecting brain tumors effectively using MRI images.

Originality/value

This paper adopts the latest optimization algorithm called COR-CSO to detect brain tumors using NN and CNN. This is the first study that uses COR-CSO-based optimization for accurate brain tumor detection.

To view the access options for this content please click here
Article
Publication date: 13 November 2020

Mohammad Nabil Almunawar, Muhammad Anshari and Syamimi Ariff Lim

The purpose of this paper is to investigate the enabling factors and the customers’ acceptance of ride-hailing in Indonesia.

Abstract

Purpose

The purpose of this paper is to investigate the enabling factors and the customers’ acceptance of ride-hailing in Indonesia.

Design/methodology/approach

The authors adopt some constructs from the unified theory of acceptance and use of technology (UTAUT) 2 as the framework for the study to derive factors that influence the acceptance of ride-hailing in Indonesia. Samples through a convenience sampling method were collected from an online survey and were transformed into data through coding and subsequently processed using SPSS for descriptive analysis, reliability test, correlation and multiple regression analysis for hypothesis testing.

Findings

Ride-hailing started in 2015 in Indonesia. Five enabling factors make digital ride-hailing possible, the internet, smartphone, broadband wireless network, digital map and global positioning system. The authors found that performance expectancy, social influence and habit positively influence customers to accept ride-hailing in Indonesia.

Research limitations/implications

Although this research has a small sample, it is still relevant to understand people’s acceptance to the ride-hailing platform. As a ride-hailing platform is now transformed to a multisided markets platform, adoption studies or other studies on each market to cover the whole picture of the platform influence to the society, and its contribution to the national economy will be very interesting. The authors’ future research will cover various services covered by ride-hailing companies.

Originality/value

This study proposes and argues that four main enabling factors make digital ride-hailing a viable business. The study contributes to three significant factors that influence the acceptance of ride-hailing in Indonesia.

Details

Journal of Science and Technology Policy Management, vol. 12 no. 3
Type: Research Article
ISSN: 2053-4620

Keywords

1 – 10 of over 5000