Search results

1 – 10 of over 15000
Article
Publication date: 4 December 2017

Juhwan Kim, Sunghae Jun, Dong-Sik Jang and Sangsung Park

Patent contains vast information on developed technologies because of the patent system. So, it is important to analyze patent data for understanding technologies. Most previous…

1499

Abstract

Purpose

Patent contains vast information on developed technologies because of the patent system. So, it is important to analyze patent data for understanding technologies. Most previous studies on patent analysis were focused on the technology itself. Their research results lacked the consideration of products. But the patent analysis based on products is crucial for company because a company grows by sales of competitive products. The purpose of this paper is to propose a novel methodology of patent analysis for product-based technology. This study contributes to the product development strategy of a company.

Design/methodology/approach

The primary goal for developing technology is to release a new product. So it is important to analyze the technology based on the product. In this study, the authors analyze Apple’s technologies based in iPod, iPhone, and iPad. In addition, the authors propose a new methodology to analyze product-based technology. The authors call this an integrated social network mining (ISNM). In the ISNM, the authors carry out a social network analysis (SNA) according to each product of Apple, and integrate all SNA results of iPod, iPhone, and iPad using the technological keywords.

Findings

In this case study, the authors analyze Apple’s technologies according to Apple’s innovative products, such as the iPod, iPhone, and iPad. From the ISNM results of Apple’s technology, the authors can find which technological detail is more important in overall structure of Apple’s technologies.

Practical implications

This study contributes to the management of technology including new product development, technological innovation, and research and development planning. To know the technological relationship between whole technologies based on products can be the source of intensification of technological competitiveness.

Originality/value

Most of studies on technology analysis were focused on patent technology itself. Though one of their research goals was to develop new product, they had their limits considering the products because they did not use the technology information in the technology analysis. The originality of this research is to use the product information in technology analysis using the proposed ISNM.

Details

Industrial Management & Data Systems, vol. 117 no. 10
Type: Research Article
ISSN: 0263-5577

Keywords

Article
Publication date: 4 May 2020

Fatma Altuntas and Mehmet Şahin Gök

The purpose of this paper is to analyze the wind energy technologies using the social network analysis based on patent information. Analysis of patent documents with social network

Abstract

Purpose

The purpose of this paper is to analyze the wind energy technologies using the social network analysis based on patent information. Analysis of patent documents with social network analysis is used to identify the most influential and connected technologies in the field of wind energy.

Design/methodology/approach

In the literature, patent data are often used to evaluate technologies. Patents related to wind energy technologies are obtained from the United States Patent and Trademark Office database and the relationships among sub-technologies based on Corporate Patent Classification (CPC) codes are analyzed in this study. The results of two-phase algorithm for mining high average-utility itemsets algorithm, which is one of the utility mining algorithm in data mining, is used to find associations among wind energy technologies for social network analysis.

Findings

The results of this study show that it is very important to focus on wind motors and technologies related to energy conversion or management systems reducing greenhouse gas emissions. The results of this study imply that Y02E, F03D and F05B CPC codes are the most influential CPC codes based on social network analysis.

Originality/value

Analysis of patent documents with social network analysis for technology evaluation is extremely limited in the literature. There is no research related to the analysis of patent documents with social network analysis, in particular CPC codes, for wind energy technology. This paper fills this gap in the literature. This study explores technologies related to wind energy technologies and identifies the most influential wind energy technologies in practice. This study also extracts useful information and knowledge to identify core corporate patent class (es) in the field of wind energy technology.

Details

Kybernetes, vol. 50 no. 5
Type: Research Article
ISSN: 0368-492X

Keywords

Content available
Book part
Publication date: 30 July 2018

Abstract

Details

Marketing Management in Turkey
Type: Book
ISBN: 978-1-78714-558-0

Article
Publication date: 13 December 2019

Yang Li and Xuhua Hu

The purpose of this paper is to solve the problem of information privacy and security of social users. Mobile internet and social network are more and more deeply integrated into…

Abstract

Purpose

The purpose of this paper is to solve the problem of information privacy and security of social users. Mobile internet and social network are more and more deeply integrated into people’s daily life, especially under the interaction of the fierce development momentum of the Internet of Things and diversified personalized services, more and more private information of social users is exposed to the network environment actively or unintentionally. In addition, a large amount of social network data not only brings more benefits to network application providers, but also provides motivation for malicious attackers. Therefore, under the social network environment, the research on the privacy protection of user information has great theoretical and practical significance.

Design/methodology/approach

In this study, based on the social network analysis, combined with the attribute reduction idea of rough set theory, the generalized reduction concept based on multi-level rough set from the perspectives of positive region, information entropy and knowledge granularity of rough set theory were proposed. Furthermore, it was traversed on the basis of the hierarchical compatible granularity space of the original information system and the corresponding attribute values are coarsened. The selected test data sets were tested, and the experimental results were analyzed.

Findings

The results showed that the algorithm can guarantee the anonymity requirement of data publishing and improve the effect of classification modeling on anonymous data in social network environment.

Research limitations/implications

In the test and verification of privacy protection algorithm and privacy protection scheme, the efficiency of algorithm and scheme needs to be tested on a larger data scale. However, the data in this study are not enough. In the following research, more data will be used for testing and verification.

Practical implications

In the context of social network, the hierarchical structure of data is introduced into rough set theory as domain knowledge by referring to human granulation cognitive mechanism, and rough set modeling for complex hierarchical data is studied for hierarchical data of decision table. The theoretical research results are applied to hierarchical decision rule mining and k-anonymous privacy protection data mining research, which enriches the connotation of rough set theory and has important theoretical and practical significance for further promoting the application of this theory. In addition, combined the theory of secure multi-party computing and the theory of attribute reduction in rough set, a privacy protection feature selection algorithm for multi-source decision table is proposed, which solves the privacy protection problem of feature selection in distributed environment. It provides a set of effective rough set feature selection method for privacy protection classification mining in distributed environment, which has practical application value for promoting the development of privacy protection data mining.

Originality/value

In this study, the proposed algorithm and scheme can effectively protect the privacy of social network data, ensure the availability of social network graph structure and realize the need of both protection and sharing of user attributes and relational data.

Details

Library Hi Tech, vol. 40 no. 1
Type: Research Article
ISSN: 0737-8831

Keywords

Article
Publication date: 26 June 2018

Larissa Statsenko, Alex Gorod and Vernon Ireland

This paper aims to propose an empirically grounded governance framework based on complex adaptive systems (CAS) principles to facilitate formation of well-connected regional…

1259

Abstract

Purpose

This paper aims to propose an empirically grounded governance framework based on complex adaptive systems (CAS) principles to facilitate formation of well-connected regional supply chains that foster economic development, adaptability and resilience of mining regions.

Design/methodology/approach

This study is an exploratory case study of the South Australian (SA) mining industry that includes 38 semi-structured interviews with the key stakeholders and structural analysis of the regional supply network (RSN).

Findings

Findings demonstrate the applicability of the CAS framework as a structured approach to the governance of the mining industry regional supply chains. In particular, the findings exemplify the relationship between RSN governance, its structure and interconnectivity and their combined impact on the adaptability and resilience of mining regions.

Research limitations/implications

The data set analysed in the current study is static. Longitudinal data would permit a deeper insight into the evolution of the RSN structure and connectivity. The validity of the proposed framework could be further strengthened by being applied to other industrial domains and geographical contexts.

Practical/implications

The proposed framework offers a novel insight for regional policy-makers striving to create an environment that facilitates the formation of well-integrated regional supply chains in mining regions through more focussed policy and strategies.

Originality/value

The proposed framework is one of the first attempts to offer a holistic structured approach to governance of the regional supply chains based on CAS principles. With the current transformative changes in the global mining industry, policy-makers and supply chain practitioners have an urgent need to embrace CAS and network paradigms to remain competitive in the twenty-first century.

Details

Supply Chain Management: An International Journal, vol. 23 no. 4
Type: Research Article
ISSN: 1359-8546

Keywords

Article
Publication date: 10 July 2023

Yuzhen Long, Chunli Yang, Xiangchun Li, Weidong Lu, Qi Zhang and Jiaxing Gao

Coal is the basic energy and essential resource in China, which is crucial to the economic lifeline and energy security of the country. Coal mining has been ever exposed to…

Abstract

Purpose

Coal is the basic energy and essential resource in China, which is crucial to the economic lifeline and energy security of the country. Coal mining has been ever exposed to potential safety risks owing to the complex geologic environment. Effective safety supervision is a vital guarantee for safe production in coal mines. This paper aims to explore the impacts of the internet+ coal mine safety supervision (CMSS) mode that is being emerged in China.

Design/methodology/approach

In this study, the key factors influencing CMSS are identified by social network analysis. They are used to develop a multiple linear regression model of law enforcement frequency for conventional CMSS mode, which is then modified by an analytical hierarchy process to predict the law enforcement frequency of internet+ CMSS mode.

Findings

The regression model demonstrated high accuracy and reliability in predicting law enforcement frequency. Comparative analysis revealed that the law enforcement frequency in the internet+ mode was approximately 40% lower than the conventional mode. This reduction suggests a potential improvement in cost-efficiency, and the difference is expected to become even more significant with an increase in law enforcement frequency.

Originality/value

To the best of the authors’ knowledge, this is one of the few available pieces of research which explore the cost-efficiency of CMSS by forecasting law enforcement frequency. The study results provide a theoretical basis for promoting the internet+ CMSS mode to realize the healthy and sustainable development of the coal mining industry.

Details

International Journal of Energy Sector Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1750-6220

Keywords

Article
Publication date: 1 April 2003

Georgios I. Zekos

Aim of the present monograph is the economic analysis of the role of MNEs regarding globalisation and digital economy and in parallel there is a reference and examination of some…

88455

Abstract

Aim of the present monograph is the economic analysis of the role of MNEs regarding globalisation and digital economy and in parallel there is a reference and examination of some legal aspects concerning MNEs, cyberspace and e‐commerce as the means of expression of the digital economy. The whole effort of the author is focused on the examination of various aspects of MNEs and their impact upon globalisation and vice versa and how and if we are moving towards a global digital economy.

Details

Managerial Law, vol. 45 no. 1/2
Type: Research Article
ISSN: 0309-0558

Keywords

Book part
Publication date: 18 April 2022

Kishore Kumar

Considering the dearth of industry-specific empirical research exploring sustainability reporting in the context of developing countries, this chapter aims to critically examine…

Abstract

Purpose

Considering the dearth of industry-specific empirical research exploring sustainability reporting in the context of developing countries, this chapter aims to critically examine the extent and the nature of sustainability information disclosure of environmentally polluting industries in India.

Methodology

Data are collected from business responsibility reports (BRRs), sustainability reports, Corporate Social Responsibility (CSR) reports and integrated reports of all 57 energy and mining companies included in NIFTY500 Index at National Stock Exchange of India for the year 2017–2018 and 2018–2019. Content analysis is used to examine the sustainability disclosure practices and one-way analysis of variance (ANOVA) statistical analysis is performed to test the difference across various dimensions of sustainability reporting of companies.

Findings

The results indicate low environmental reporting of the key indicators by energy and mining companies in India. It is found that state-owned companies have better social reporting practices against private sector companies. The findings also indicate that Global reporting initiative (GRI) based reporting have better sustainability disclosure practices and companies reporting based on BRR lack quantitative information disclosure.

Implications

The findings of the present chapter have several implications for policymakers, investors, regulators and management of these high environmental and social impact companies in India. The findings which coincide with the key areas of sustainability disclosure can be used for improving sustainability disclosure practices by the various stakeholders.

Originality

This is one of the first studies to investigate the nature and extent of sustainability performance disclosure of the companies from polluting industries in India. This chapter also contributes to the existing sustainability reporting literature by providing evidence on industry-specific disclosure in the context of a developing country.

Book part
Publication date: 7 October 2015

Azizah Ahmad

The strategic management literature emphasizes the concept of business intelligence (BI) as an essential competitive tool. Yet the sustainability of the firms’ competitive…

Abstract

The strategic management literature emphasizes the concept of business intelligence (BI) as an essential competitive tool. Yet the sustainability of the firms’ competitive advantage provided by BI capability is not well researched. To fill this gap, this study attempts to develop a model for successful BI deployment and empirically examines the association between BI deployment and sustainable competitive advantage. Taking the telecommunications industry in Malaysia as a case example, the research particularly focuses on the influencing perceptions held by telecommunications decision makers and executives on factors that impact successful BI deployment. The research further investigates the relationship between successful BI deployment and sustainable competitive advantage of the telecommunications organizations. Another important aim of this study is to determine the effect of moderating factors such as organization culture, business strategy, and use of BI tools on BI deployment and the sustainability of firm’s competitive advantage.

This research uses combination of resource-based theory and diffusion of innovation (DOI) theory to examine BI success and its relationship with firm’s sustainability. The research adopts the positivist paradigm and a two-phase sequential mixed method consisting of qualitative and quantitative approaches are employed. A tentative research model is developed first based on extensive literature review. The chapter presents a qualitative field study to fine tune the initial research model. Findings from the qualitative method are also used to develop measures and instruments for the next phase of quantitative method. The study includes a survey study with sample of business analysts and decision makers in telecommunications firms and is analyzed by partial least square-based structural equation modeling.

The findings reveal that some internal resources of the organizations such as BI governance and the perceptions of BI’s characteristics influence the successful deployment of BI. Organizations that practice good BI governance with strong moral and financial support from upper management have an opportunity to realize the dream of having successful BI initiatives in place. The scope of BI governance includes providing sufficient support and commitment in BI funding and implementation, laying out proper BI infrastructure and staffing and establishing a corporate-wide policy and procedures regarding BI. The perceptions about the characteristics of BI such as its relative advantage, complexity, compatibility, and observability are also significant in ensuring BI success. The most important results of this study indicated that with BI successfully deployed, executives would use the knowledge provided for their necessary actions in sustaining the organizations’ competitive advantage in terms of economics, social, and environmental issues.

This study contributes significantly to the existing literature that will assist future BI researchers especially in achieving sustainable competitive advantage. In particular, the model will help practitioners to consider the resources that they are likely to consider when deploying BI. Finally, the applications of this study can be extended through further adaptation in other industries and various geographic contexts.

Details

Sustaining Competitive Advantage Via Business Intelligence, Knowledge Management, and System Dynamics
Type: Book
ISBN: 978-1-78441-764-2

Keywords

Content available
Article
Publication date: 19 August 2022

Enrico D'agostini

This study explores the levels of Facebook engagement of the two largest Europe-based shipping lines, Maersk and Mediterranean Shipping Company (MSC), to discover the marketing…

1937

Abstract

Purpose

This study explores the levels of Facebook engagement of the two largest Europe-based shipping lines, Maersk and Mediterranean Shipping Company (MSC), to discover the marketing orientation of the topics advertised and to ascertain whether they tend to be about brand recognition, new transport services, or value propositions for stakeholders.

Design/methodology/approach

The Facebook posts of Maersk and MSC were analysed using social media text mining and social network analysis (SNA); in- and out-degree centrality analysis was performed to determine the key terms in their posts. NetMiner software was used to collect the respective data on Maersk and MSC. The inquiry period was set between May 2020 and February 2021.

Findings

The results indicated a divergence in their post contents, with higher engagement and a wider, more active follower base for MSC than for Maersk. Maersk primarily posts about logistics services and supply chain solutions. MSC communicates about new and large container vessels. Both companies seek greater brand recognition and information sharing through social media.

Originality/value

These results can be used by the stakeholders to evaluate whether Maersk and MSC truly deliver on their respective value propositions communicated online through their social media engagement. It can also help Maersk and MSC gauge the level of effectiveness of their communication with stakeholders and modify their digital engagement strategy accordingly.

Details

Maritime Business Review, vol. 8 no. 3
Type: Research Article
ISSN: 2397-3757

Keywords

1 – 10 of over 15000