Search results

1 – 10 of over 16000
Article
Publication date: 29 August 2018

Norihiro Kamide

The purpose of this paper is to develop new simple logics and translations for hierarchical model checking. Hierarchical model checking is a model-checking paradigm that can…

Abstract

Purpose

The purpose of this paper is to develop new simple logics and translations for hierarchical model checking. Hierarchical model checking is a model-checking paradigm that can appropriately verify systems with hierarchical information and structures.

Design/methodology/approach

In this study, logics and translations for hierarchical model checking are developed based on linear-time temporal logic (LTL), computation-tree logic (CTL) and full computation-tree logic (CTL*). A sequential linear-time temporal logic (sLTL), a sequential computation-tree logic (sCTL), and a sequential full computation-tree logic (sCTL*), which can suitably represent hierarchical information and structures, are developed by extending LTL, CTL and CTL*, respectively. Translations from sLTL, sCTL and sCTL* into LTL, CTL and CTL*, respectively, are defined, and theorems for embedding sLTL, sCTL and sCTL* into LTL, CTL and CTL*, respectively, are proved using these translations.

Findings

These embedding theorems allow us to reuse the standard LTL-, CTL-, and CTL*-based model-checking algorithms to verify hierarchical systems that are modeled and specified by sLTL, sCTL and sCTL*.

Originality/value

The new logics sLTL, sCTL and sCTL* and their translations are developed, and some illustrative examples of hierarchical model checking are presented based on these logics and translations.

Details

Data Technologies and Applications, vol. 52 no. 4
Type: Research Article
ISSN: 2514-9288

Keywords

Article
Publication date: 10 June 2014

Takahiro Ando, Hirokazu Yatsu, Weiqiang Kong, Kenji Hisazumi and Akira Fukuda

This study aims to describe the behavior of blocks in the system under consideration using systems modeling language (SysML) state machine diagrams. In this paper, formalization…

Abstract

Purpose

This study aims to describe the behavior of blocks in the system under consideration using systems modeling language (SysML) state machine diagrams. In this paper, formalization and model checking for SysML state machine diagrams have been investigated.

Design/methodology/approach

The work by Zhang and Liu (2010) proposed a formalization of SysML state machine diagrams in which the diagrams were translated into CSP# processes that could be verified by the state-of-the-art model checker PAT. In this paper, several modifications have been made and new rules have been added to the translation described in that work.

Findings

First, three translation rules were modified, which apparently are inappropriately defined according to the SysML definition of state machine diagrams. Next, we add new translation rules for two components of the diagrams – junction and choice pseudostates – which have not been dealt with previously. Further, we are implementing the automatic translation system on a web-based model-driven development tool, which reflects on our translation rules.

Originality/value

As the contribution of this work, more reasonable verification results for more general SysML state machine diagrams can be achieved.

Details

International Journal of Web Information Systems, vol. 10 no. 2
Type: Research Article
ISSN: 1744-0084

Keywords

Article
Publication date: 3 March 2022

Jennifer Lees-Marshment and Neil Thomas Bendle

Political management is about getting things done in campaigns, parties and government. Political organizations can use management concepts such as strategic planning, human…

Abstract

Purpose

Political management is about getting things done in campaigns, parties and government. Political organizations can use management concepts such as strategic planning, human resources and organizational design to help them achieve their goals. Research into specifically how management is used by political practitioners – political staffers and politicians – in government is limited. This study aims to fill that gap.

Design/methodology/approach

The authors review the limited literature on political management, outline interview methodology, results and conclude with overall lessons drawn out using the qualitative data analysis software NVivo.

Findings

This study identifies the aspects of political management that political practitioners saw as the most important, the difference between managing in business and politics, and why.

Research limitations/implications

This study provides suggestions for what future empirical research should focus on, noting a focus on informal behavior that relate to people and power that are not seen from outside the organization.

Originality/value

The perspectives of high-level practitioners help give a view to what political management really is.

Details

International Journal of Public Leadership, vol. 18 no. 4
Type: Research Article
ISSN: 2056-4929

Keywords

Article
Publication date: 11 March 2022

Flavio Corradini, Andrea Polini, Barbara Re, Lorenzo Rossi and Francesco Tiezzi

This paper aims at supporting business process designers in modelling collaborative scenarios in terms of hierarchical BPMN collaboration diagrams, to enforce consistency among…

Abstract

Purpose

This paper aims at supporting business process designers in modelling collaborative scenarios in terms of hierarchical BPMN collaboration diagrams, to enforce consistency among different hierarchical levels.

Design/methodology/approach

The proposed approach is based on a set of guidelines to apply during the modelling of hierarchical diagrams. These guidelines address consistency issues related to the hiding capability provided by sub-process and call activity elements, which may obscure behaviours at inner levels, especially exchange of messages, that are inconsistent with those in other hierarchical levels. A laboratory experience validates the guidelines' effectiveness.

Findings

The paper points out the issues of hierarchical diagrams, and the lack of support in this context from the existing BPMN modelling tools. Moreover, through a laboratory experience, the paper shows the benefits carried by the proposed guidelines concerning the quality of the modelled diagrams.

Practical implications

The proposed guidelines have been implemented in a consistency checking tool that avoids consistency errors during the modelling activity. To foster its usage, the tool has been integrated into the Eclipse BPMN modelling environment.

Originality/value

The paper, employing consistency guidelines, provides a novel solution to the weaknesses of hierarchical modelling.

Details

Business Process Management Journal, vol. 28 no. 2
Type: Research Article
ISSN: 1463-7154

Keywords

Article
Publication date: 22 November 2019

Saeed Sabamoniri and Alireza Souri

Grid computing is an effective environment for the execution of parallel applications that requires great computing power. This paper aims to present, based on the hierarchical

Abstract

Purpose

Grid computing is an effective environment for the execution of parallel applications that requires great computing power. This paper aims to present, based on the hierarchical architecture, an improved weighted resource discovery (WRD) algorithm to manage allocation of resources and minimize cost of communications between grid nodes.

Design/methodology/approach

A behavioral modeling method is addressed to prove the proposed method correctness. The behavioral model of the proposed algorithm is implemented by StarUML tool with two different model-checking mechanisms. Then, the resource discovery correctness is analyzed in terms of reachability condition, fairness condition and deadlock-free using NuSMV model checker.

Findings

The results show that WRD algorithm has better performance in requiring re-discovery process, the number of examined nodes in each request and discovering the free resources with high-bandwidth links.

Originality/value

To store information of resources, a new data structure called resource information table is proposed which facilitates resource finding of the algorithm. A behavioral modeling method is addressed to prove the proposed method correctness.

Details

International Journal of Pervasive Computing and Communications, vol. 15 no. 3/4
Type: Research Article
ISSN: 1742-7371

Keywords

Open Access
Book part
Publication date: 1 December 2022

Clemens Striebing

Purpose: Previous research identified a measurement gap in the individual assessment of social misconduct in the workplace related to gender. This gap implies that women respond…

Abstract

Purpose: Previous research identified a measurement gap in the individual assessment of social misconduct in the workplace related to gender. This gap implies that women respond to comparable self-reported acts of bullying or sexual discrimination slightly more often than men with the self-labeling as “bullied” or “sexually discriminated and/or harassed.” This study tests this hypothesis for women and men in the scientific workplace and explores patterns of gender-related differences in self-reporting behavior.

Basic design: The hypotheses on the connection between gender and the threshold for self-labeling as having been bullied or sexually discriminated against were tested based on a sample from a large German research organization. The sample includes 5,831 responses on bullying and 6,987 on sexual discrimination (coverage of 24.5 resp. 29.4 percentage of all employees). Due to a large number of cases and the associated high statistical power, this sample for the first time allows a detailed analysis of the “gender-related measurement gap.” The research questions formulated in this study were addressed using two hierarchical regression models to predict the mean values of persons who self-labeled as having been bullied or sexually discriminated against. The status of the respondents as scientific or non-scientific employees was included as a control variable.

Results: According to a self-labeling approach, women reported both bullying and sexual discrimination more frequently. This difference between women and men disappeared for sexual discrimination when, in addition to the gender of a person, self-reported behavioral items were considered in the prediction of self-labeling. For bullying, the difference between the two genders remained even in this extended prediction. No statistically significant relationship was found between the frequency of self-reported items and the effect size of their interaction with gender for either bullying or sexual discrimination. When comparing bullying and sexual discrimination, it should be emphasized that, on average, women report experiencing a larger number of different behavioral items than men.

Interpretation and relevance: The results of the study support the current state of research. However, they also show how volatile the measurement instruments for bullying and sexual discrimination are. For example, the gender-related measurement gap is considerably influenced by single items in the Negative Acts Questionnaire and Sexual Experience Questionnaire. The results suggest that women are generally more likely than men to report having experienced bullying and sexual discrimination. While an unexplained “gender gap” in the understanding of bullying was found for bullying, this was not the case for sexual discrimination.

Details

Diversity and Discrimination in Research Organizations
Type: Book
ISBN: 978-1-80117-959-1

Keywords

Book part
Publication date: 28 September 2015

Md Shah Azam

Information and communications technology (ICT) offers enormous opportunities for individuals, businesses and society. The application of ICT is equally important to economic and…

Abstract

Information and communications technology (ICT) offers enormous opportunities for individuals, businesses and society. The application of ICT is equally important to economic and non-economic activities. Researchers have increasingly focused on the adoption and use of ICT by small and medium enterprises (SMEs) as the economic development of a country is largely dependent on them. Following the success of ICT utilisation in SMEs in developed countries, many developing countries are looking to utilise the potential of the technology to develop SMEs. Past studies have shown that the contribution of ICT to the performance of SMEs is not clear and certain. Thus, it is crucial to determine the effectiveness of ICT in generating firm performance since this has implications for SMEs’ expenditure on the technology. This research examines the diffusion of ICT among SMEs with respect to the typical stages from innovation adoption to post-adoption, by analysing the actual usage of ICT and value creation. The mediating effects of integration and utilisation on SME performance are also studied. Grounded in the innovation diffusion literature, institutional theory and resource-based theory, this study has developed a comprehensive integrated research model focused on the research objectives. Following a positivist research paradigm, this study employs a mixed-method research approach. A preliminary conceptual framework is developed through an extensive literature review and is refined by results from an in-depth field study. During the field study, a total of 11 SME owners or decision-makers were interviewed. The recorded interviews were transcribed and analysed using NVivo 10 to refine the model to develop the research hypotheses. The final research model is composed of 30 first-order and five higher-order constructs which involve both reflective and formative measures. Partial least squares-based structural equation modelling (PLS-SEM) is employed to test the theoretical model with a cross-sectional data set of 282 SMEs in Bangladesh. Survey data were collected using a structured questionnaire issued to SMEs selected by applying a stratified random sampling technique. The structural equation modelling utilises a two-step procedure of data analysis. Prior to estimating the structural model, the measurement model is examined for construct validity of the study variables (i.e. convergent and discriminant validity).

The estimates show cognitive evaluation as an important antecedent for expectation which is shaped primarily by the entrepreneurs’ beliefs (perception) and also influenced by the owners’ innovativeness and culture. Culture further influences expectation. The study finds that facilitating condition, environmental pressure and country readiness are important antecedents of expectation and ICT use. The results also reveal that integration and the degree of ICT utilisation significantly affect SMEs’ performance. Surprisingly, the findings do not reveal any significant impact of ICT usage on performance which apparently suggests the possibility of the ICT productivity paradox. However, the analysis finally proves the non-existence of the paradox by demonstrating the mediating role of ICT integration and degree of utilisation explain the influence of information technology (IT) usage on firm performance which is consistent with the resource-based theory. The results suggest that the use of ICT can enhance SMEs’ performance if the technology is integrated and properly utilised. SME owners or managers, interested stakeholders and policy makers may follow the study’s outcomes and focus on ICT integration and degree of utilisation with a view to attaining superior organisational performance.

This study urges concerned business enterprises and government to look at the environmental and cultural factors with a view to achieving ICT usage success in terms of enhanced firm performance. In particular, improving organisational practices and procedures by eliminating the traditional power distance inside organisations and implementing necessary rules and regulations are important actions for managing environmental and cultural uncertainties. The application of a Bengali user interface may help to ensure the productivity of ICT use by SMEs in Bangladesh. Establishing a favourable national technology infrastructure and legal environment may contribute positively to improving the overall situation. This study also suggests some changes and modifications in the country’s existing policies and strategies. The government and policy makers should undertake mass promotional programs to disseminate information about the various uses of computers and their contribution in developing better organisational performance. Organising specialised training programs for SME capacity building may succeed in attaining the motivation for SMEs to use ICT. Ensuring easy access to the technology by providing loans, grants and subsidies is important. Various stakeholders, partners and related organisations should come forward to support government policies and priorities in order to ensure the productive use of ICT among SMEs which finally will help to foster Bangladesh’s economic development.

Details

E-Services Adoption: Processes by Firms in Developing Nations
Type: Book
ISBN: 978-1-78560-325-9

Keywords

Article
Publication date: 24 May 2023

Rosa Vinciguerra, Francesca Cappellieri, Michele Pizzo and Rosa Lombardi

This paper aims to define a hierarchical and multi-criteria framework based on pillars of the Modernization of Higher Education to evaluate European Accounting Doctoral Programmes…

Abstract

Purpose

This paper aims to define a hierarchical and multi-criteria framework based on pillars of the Modernization of Higher Education to evaluate European Accounting Doctoral Programmes (EADE-Model).

Design/methodology/approach

The authors applied a quali-quantitative methodology based on the analytic hierarchy process and the survey approach. The authors conducted an extensive literature and regulation review to identify the dimensions affecting the quality of Doctoral Programmes, choosing accounting as the relevant and pivotal field. The authors also used the survey to select the most critical quality dimensions and derive their weight to build EADE Model. The validity of the proposed model has been tested through the application to the Italian scenario.

Findings

The findings provide a critical extension of accounting ranking studies constructing a multi-criteria, hierarchical and updated evaluation model recognizing the role of doctoral training in the knowledge-based society. The results shed new light on weak areas apt to be improved and propose potential amendments to enhance the quality standard of ADE.

Practical implications

Theoretical and practical implications of this paper are directed to academics, policymakers and PhD programmes administrators.

Originality/value

The research is original in drafting a hierarchical multi-criteria framework for evaluating ADE in the Higher Education System. This model may be extended to other fields.

Article
Publication date: 10 August 2020

Abhilasha Meena, Sanjay Dhir and Sushil

This study aims to identify and prioritize various growth-accelerating factors in the Indian automotive industry. It further develops a hierarchical model to examine the mutual…

1211

Abstract

Purpose

This study aims to identify and prioritize various growth-accelerating factors in the Indian automotive industry. It further develops a hierarchical model to examine the mutual interactions between the factors, their dependence and their driving power.

Design/methodology/approach

This study first identifies the growth-accelerating factors and then uses the modified total interpretive structural modeling (m-TISM) framework, which is an extended version of TISM. It further uses MICMAC analysis to analyze the mutual interrelation between the identified factors.

Findings

This study highlights the interrelation amongst the factors using m-TISM model. A hierarchical model shows the level of autonomous, dependence, linkage and independent factors considering the Indian automotive industry. This study also provides the understanding related to the interdependence of growth-accelerating factors.

Research limitations/implications

The government and practitioners could evaluate the growth-accelerating factors which have higher driving power for implementing efficient policies and strategy formulation. By implementing m-TISM model in the Indian automotive industry, auto manufacturers can become more productive and profitable. Future studies could use other methods such as expert opinion to derive the factors, and further model could be verified using structural equation modeling technique.

Originality/value

This study uses a novel m-TISM framework for the analysis of growth-accelerating factors in the context of the Indian automotive industry. It further provides a detailed theoretical and conceptual understanding relating to the philosophy and establishes an interrelation amongst these under-researched growth-accelerating factors.

Open Access
Article
Publication date: 20 August 2021

Daniel Hofer, Markus Jäger, Aya Khaled Youssef Sayed Mohamed and Josef Küng

For aiding computer security experts in their study, log files are a crucial piece of information. Especially the time domain is very important for us because in most cases…

2206

Abstract

Purpose

For aiding computer security experts in their study, log files are a crucial piece of information. Especially the time domain is very important for us because in most cases, timestamps are the only linking points between events caused by attackers, faulty systems or simple errors and their corresponding entries in log files. With the idea of storing and analyzing this log information in graph databases, we need a suitable model to store and connect timestamps and their events. This paper aims to find and evaluate different approaches how to store timestamps in graph databases and their individual benefits and drawbacks.

Design/methodology/approach

We analyse three different approaches, how timestamp information can be represented and stored in graph databases. For checking the models, we set up four typical questions that are important for log file analysis and tested them for each of the models. During the evaluation, we used the performance and other properties as metrics, how suitable each of the models is for representing the log files’ timestamp information. In the last part, we try to improve one promising looking model.

Findings

We come to the conclusion, that the simplest model with the least graph database-specific concepts in use is also the one yielding the simplest and fastest queries.

Research limitations/implications

Limitations to this research are that only one graph database was studied and also improvements to the query engine might change future results.

Originality/value

In the study, we addressed the issue of storing timestamps in graph databases in a meaningful, practical and efficient way. The results can be used as a pattern for similar scenarios and applications.

Details

International Journal of Web Information Systems, vol. 17 no. 5
Type: Research Article
ISSN: 1744-0084

Keywords

1 – 10 of over 16000