Search results

1 – 10 of 868
Open Access
Article
Publication date: 3 August 2020

Yan Ma, Cai Minqiang and Li Yun

The purpose of this paper is to define the Internet as a virtual space supported by technologies and presented in the form of socioeconomic relations from the perspective of…

1138

Abstract

Purpose

The purpose of this paper is to define the Internet as a virtual space supported by technologies and presented in the form of socioeconomic relations from the perspective of political economy. The Internet space is a unique virtual commodity different from ordinary commodities and has the following effect characteristics: super replicability, space- and time-transcendence, open-source shareability and reality–virtuality transformation.

Design/methodology/approach

Internet space can also be imagined as a piece of virtual land. Internet space can be deemed as a piece of virtual land and its value can be divided into labor value and virtual value. The pricing model of virtual value is mainly determined by the gain and discount rate and this value comes from the transfer and markup of social value. In the context of the Internet Plus era, Internet space has become an essential economic factor that influences human economic activities.

Findings

Therefore, it is of practical significance and theoretical value to introduce Internet space as an economic variable into the framework of economic theory. The realistic logic of Internet space is to influence human economic behaviors with the combination of information binding.

Originality/value

The theoretical mechanism is to have an impact on the micro-market price by changing market relations from two-dimensional to three-dimensional. Its path to functioning at the macro level is to influence economic behaviors by changing the expectations of investment and consumption, resulting in new economic trends.

Details

China Political Economy, vol. 3 no. 1
Type: Research Article
ISSN: 2516-1652

Keywords

Open Access
Article
Publication date: 27 December 2021

Hristo Trifonov and Donal Heffernan

The purpose of this paper is to describe how emerging open standards are replacing traditional industrial networks. Current industrial Ethernet networks are not interoperable;…

3201

Abstract

Purpose

The purpose of this paper is to describe how emerging open standards are replacing traditional industrial networks. Current industrial Ethernet networks are not interoperable; thus, limiting the potential capabilities for the Industrial Internet of Things (IIoT). There is no forthcoming new generation fieldbus standard to integrate into the IIoT and Industry 4.0 revolution. The open platform communications unified architecture (OPC UA) time-sensitive networking (TSN) is a potential vendor-independent successor technology for the factory network. The OPC UA is a data exchange standard for industrial communication, and TSN is an Institute of Electrical and Electronics Engineers standard for Ethernet that supports real-time behaviour. The merging of these open standard solutions can facilitate cross-vendor interoperability for Industry 4.0 and IIoT products.

Design/methodology/approach

A brief review of the history of the fieldbus standards is presented, which highlights the shortcomings for current industrial systems in meeting converged traffic solutions. An experimental system for the OPC UA TSN is described to demonstrate an approach to developing a three-layer factory network system with an emphasis on the field layer.

Findings

From the multitude of existing industrial network schemes, there is a convergence pathway in solutions based on TSN Ethernet and OPC UA. At the field level, basic timing measurements in this paper show that the OPC UA TSN can meet the basic critical timing requirements for a fieldbus network.

Originality/value

This paper uniquely focuses on the specific fieldbus standards elements of industrial networks evolution and traces the developments from the early history to the current developing integration in IIoT context.

Details

International Journal of Pervasive Computing and Communications, vol. 19 no. 3
Type: Research Article
ISSN: 1742-7371

Keywords

Open Access
Article
Publication date: 17 October 2019

Sherali Zeadally, Farhan Siddiqui, Zubair Baig and Ahmed Ibrahim

The aim of this paper is to identify some of the challenges that need to be addressed to accelerate the deployment and adoption of smart health technologies for ubiquitous…

28007

Abstract

Purpose

The aim of this paper is to identify some of the challenges that need to be addressed to accelerate the deployment and adoption of smart health technologies for ubiquitous healthcare access. The paper also explores how internet of things (IoT) and big data technologies can be combined with smart health to provide better healthcare solutions.

Design/methodology/approach

The authors reviewed the literature to identify the challenges which have slowed down the deployment and adoption of smart health.

Findings

The authors discussed how IoT and big data technologies can be integrated with smart health to address some of the challenges to improve health-care availability, access and costs.

Originality/value

The results of this paper will help health-care designers, professionals and researchers design better health-care information systems.

Details

PSU Research Review, vol. 4 no. 2
Type: Research Article
ISSN: 2399-1747

Keywords

Open Access
Book part
Publication date: 17 August 2021

Mike Hynes

Abstract

Details

The Social, Cultural and Environmental Costs of Hyper-Connectivity: Sleeping Through the Revolution
Type: Book
ISBN: 978-1-83909-976-2

Open Access
Article
Publication date: 14 February 2023

Lemma Lessa and Daniel Gebrehawariat

This study is aimed at assessing the information security management practice with a focus on banking card security in selected financial institutions in Ethiopia, using an…

1143

Abstract

Purpose

This study is aimed at assessing the information security management practice with a focus on banking card security in selected financial institutions in Ethiopia, using an international information security standard as a benchmark. It is to identify the gaps and recommend best security practices to help financial institutions meet the required security compliance.

Design/methodology/approach

Two financial sectors were purposively selected. A total of twenty-five respondents (IT executives and IT staff) were included in the study. Quantitative data was collected using the PCI-DSS (Payment Card Industry Data Security Standard) security standard questionnaire. In addition, observation and document analysis were made.

Findings

The result shows that most of the essential security management activities in the financial sectors do not comply with the international security standard. Similarly, the level of most of the indispensable security requirements that should be in place is found to be below the acceptable level. The study also revealed major security factors that prohibit the financial sectors from PCI-DSS security standard compliance.

Originality/value

This study assessed the information security management practice with a focus on banking card security and tried to figure out the limitations of security practices of the organizations surveyed based on the standard adopted. The topic has not been well explored especially in the Ethiopia context. Hence, the result can positively influence security policies, particularly in the banking sector.

Details

International Journal of Industrial Engineering and Operations Management, vol. 5 no. 2
Type: Research Article
ISSN: 2690-6090

Keywords

Open Access
Article
Publication date: 15 May 2020

Horst Treiblmaier, Kristijan Mirkovski, Paul Benjamin Lowry and Zach G. Zacharia

The physical internet (PI) is an emerging logistics and supply chain management (SCM) concept that draws on different technologies and areas of research, such as the Internet of…

10019

Abstract

Purpose

The physical internet (PI) is an emerging logistics and supply chain management (SCM) concept that draws on different technologies and areas of research, such as the Internet of Things (IoT) and key performance indicators, with the purpose of revolutionizing existing logistics and SCM practices. The growing literature on the PI and its noteworthy potential to be a disruptive innovation in the logistics industry call for a systematic literature review (SLR), which we conducted that defines the current state of the literature and outlines future research directions and approaches.

Design/methodology/approach

The SLR that was undertaken included journal publications, conference papers and proceedings, book excerpts, industry reports and white papers. We conducted descriptive, citation, thematic and methodological analyses to understand the evolution of PI literature.

Findings

Based on the literature review and analyses, we proposed a comprehensive framework that structures the PI domain and outlines future directions for logistics and SCM researchers.

Research limitations/implications

Our research findings are limited by the relatively low number of journal publications, as the PI is a new field of inquiry that is composed primarily of conference papers and proceedings.

Originality/value

The proposed PI-based framework identifies seven PI themes, including the respective facilitators and barriers, which can inform researchers and practitioners on future potentially disruptive SC strategies.

Details

The International Journal of Logistics Management, vol. 31 no. 2
Type: Research Article
ISSN: 0957-4093

Keywords

Open Access
Article
Publication date: 24 January 2022

Yu Xiang

This paper aims to examine the recommendation system of the video-sharing website YouTube to study how control of users is effected on online platforms.

1712

Abstract

Purpose

This paper aims to examine the recommendation system of the video-sharing website YouTube to study how control of users is effected on online platforms.

Design/methodology/approach

This paper conceptualises algorithmic systems as protocols – technological and social infrastructures that both facilitate and govern interactions between autonomous actors (Galloway and Thacker, 2004, 2007). It adopts a netnographic approach (Kozinets, 2002) to study not only the formal, technological systems of the platform but also the systems as they were made sense of, understood and enacted upon by actors. It relies both on information as revealed by the organisation itself, as well as discussions between lay users in online forums and press coverage.

Findings

The results of this study indicate that the ways in which platforms selectively facilitate interactions between users constitute a form of control. While maintaining the appearance of an open and neutral marketplace, interactions on the platform are in fact highly structured. The system relies on the surveillance of user interactions to rapidly identify and propagate marketable contents, so as to maximise user “engagement” and ad revenue. The systems place few demands or restrictions on individual users, instead control is effected in a probabilistic fashion, over the population of users as a whole, so as to, in aggregate, accomplish organisational goal.

Originality/value

This paper contributes to the literature on accounting and control practices in online spaces, by extending the notion of control beyond overt rankings and evaluations, to the underlying technical and social infrastructures that facilitate and shape interactions.

Details

Qualitative Research in Accounting & Management, vol. 19 no. 3
Type: Research Article
ISSN: 1176-6093

Keywords

Open Access
Article
Publication date: 11 September 2017

Michel van Eeten

The issue of cybersecurity has been cast as the focal point of a fight between two conflicting governance models: the nation-state model of national security and the global…

5186

Abstract

Purpose

The issue of cybersecurity has been cast as the focal point of a fight between two conflicting governance models: the nation-state model of national security and the global governance model of multi-stakeholder collaboration, as seen in forums like IGF, IETF, ICANN, etc. There is a strange disconnect, however, between this supposed fight and the actual control over cybersecurity “on the ground”. This paper aims to reconnect discourse and control via a property rights approach, where control is located first and foremost in ownership.

Design/methodology/approach

This paper first conceptualizes current governance mechanisms through ownership and property rights. These concepts locate control over internet resources. They also help us understand ongoing shifts in control. Such shifts in governance are actually happening, security governance is being patched left and right, but these arrangements bear little resemblance to either the national security model of states or the global model of multi-stakeholder collaboration. With the conceptualization in hand, the paper then presents case studies of governance that have emerged around specific security externalities.

Findings

While not all mechanisms are equally effective, in each of the studied areas, the author found evidence of private actors partially internalizing the externalities, mostly on a voluntary basis and through network governance mechanisms. No one thinks that this is enough, but it is a starting point. Future research is needed to identify how these mechanisms can be extended or supplemented to further improve the governance of cybersecurity.

Originality/value

This paper bridges together the disconnected research communities on governance and (technical) cybersecurity.

Details

Digital Policy, Regulation and Governance, vol. 19 no. 6
Type: Research Article
ISSN: 2398-5038

Keywords

Open Access
Article
Publication date: 7 August 2017

Myung-Joong Kim, Juil Kim and Sun-Young Park

This study aims to investigate customers’ churning out of Internet Protocol Television (IPTV) service, one of the most prevalent forms of IT convergence.

3191

Abstract

Purpose

This study aims to investigate customers’ churning out of Internet Protocol Television (IPTV) service, one of the most prevalent forms of IT convergence.

Design/methodology/approach

Based on the review of current literature, a research model is introduced to depict the effects of select independent variables on customer churning behavior. First of all, the two groups are compared in terms of predictor variables, including switching barriers, voice of customer (VOC), membership period and degree of contents usage. Then, a curvilinear regression was applied to understand the association relationship between the level of IPTV contents usage and variables of switching barriers, VOC and membership period. Third, a logit regression was performed to predict customer churning through the variables of switching barriers, VOC, membership period and level of IPTV contents usage.

Findings

Through the empirical analysis, this study analyzed the factors affecting customer churning behavior of IPTV service providers based on switching barriers, VOC and contents usage.

Originality/value

Although several studies on IPTV have been undertaken globally, they have largely depended on self-reporting surveys to examine dynamics between antecedent variables and IPTV performance in terms of customer satisfaction, usage intension and customer retention. This empirical study is performed to understand influential factors of IPTV service defection through the weblog analysis of 3,906 service users, who represented both service defectors and non-defectors during a specific month.

Details

Asia Pacific Journal of Innovation and Entrepreneurship, vol. 11 no. 2
Type: Research Article
ISSN: 2071-1395

Keywords

Open Access
Article
Publication date: 10 January 2023

Lorenzo Lynberg and Ahmed Deif

This paper addresses a gap in research literature in the fields of blockchain technology (BC), supply chain network dynamics (SC) and network effect phenomena (NE). Extant BC and…

1355

Abstract

Purpose

This paper addresses a gap in research literature in the fields of blockchain technology (BC), supply chain network dynamics (SC) and network effect phenomena (NE). Extant BC and SC literature describes the potential benefits to be reaped through the adoption of BC technology. While BC technology does not yet meet the researched expectations of adoption, performance and efficacy, the authors analyze the three inter-related fields (BC, SC and NE) to bridge this gap in theory.

Design/methodology/approach

This paper begins with a research review correlating the technological fundamentals of BC technology into fundamental value propositions for SC logistics contexts. The authors review the gap between these theoretical technological functions and the current ecosystem of BC applications. With an overarching understanding of BC in SC contexts, this paper then explores the phenomena of NE and attempts to synthesize various interrelated aspects of the three fields (BC, SC and NE). Research frameworks from extant literature are used for cross-comparing legacy software/information system solutions with potential and existing BC-based solutions. Case studies are utilized to support this analysis.

Findings

Several key considerations and themes are identified to better inform practitioner and researcher decision-making. Novel insights pertain to BC platform architecture and application modularity, integrated governance and decision-making capabilities, and the automation capabilities that arise from a healthy application and smart contract ecosystem.

Originality/value

The core contribution is the synthesis of network effect theory with SC phenomena and BC theory and the exploration of how these three fields are inter-related in the maturation of BC technology. Specifically, the authors deepen insights from extant literature by contextualizing findings with relevant interdisciplinary theoretical frameworks.

Details

Modern Supply Chain Research and Applications, vol. 5 no. 1
Type: Research Article
ISSN: 2631-3871

Keywords

1 – 10 of 868