Search results
1 – 10 of 51Rishabh Rathore, Jitesh Thakkar and J.K. Jha
This paper investigates the overall system risk for a foodgrains supply chain capturing the interrelationship among the risk factors and the effect of risk mitigation strategies.
Abstract
Purpose
This paper investigates the overall system risk for a foodgrains supply chain capturing the interrelationship among the risk factors and the effect of risk mitigation strategies.
Design/methodology/approach
This paper first calculates the weight of risk factors using an integrated approach of failure mode, effects analysis and fuzzy VIKOR technique. Next, the weights are utilized as input for the weighted fuzzy Petri-net (WFPN) approach to calculate the system risk.
Findings
Two different WFPN models are developed based on the relationships among the risk factors, and both models demonstrate a higher risk value for the overall system.
Originality/value
The proposed methodology will help practitioners or managers understand the complexity involved in the system by capturing the interrelationship behaviour. This study also considers the concurrent effect of risk mitigation strategies for calculating the overall system risk, which helps to improve the system’s performance.
Details
Keywords
Alex Anlesinya and Samuel Ato Dadzie
The use of structured literature review methods like bibliometric analysis is growing in the management fields, but there is limited knowledge on how they can be facilitated by…
Abstract
The use of structured literature review methods like bibliometric analysis is growing in the management fields, but there is limited knowledge on how they can be facilitated by technology. Hence, we conducted a broad overview of software tools, their roles, and limitations in structured (bibliometric) literature reviewing activities. Subsequently, we show that several software tools are freely available to aid in searching the literature, identifying/ extracting relevant publications, screening/assessing quality of the extracted data, and performing analyses to generate insights from the literature. However, their applications may be confronted with several challenges such as limited analytical and functional capabilities, inadequate technological skills of researchers, and the fact that the researcher's insights are still needed to generate compelling conclusions from the results produced by software tools. Consequently, we contribute toward advancing the methodologies for performing structured reviews by providing a comprehensive and updated overview of the knowledge base of key technological software tools and the conduct of structured or bibliometric literature reviews.
Details
Keywords
This study aims to improve the reliability of emergency safety barriers by using the subjective safety analysis based on evidential reasoning theory in order to develop on a…
Abstract
Purpose
This study aims to improve the reliability of emergency safety barriers by using the subjective safety analysis based on evidential reasoning theory in order to develop on a framework for optimizing the reliability of emergency safety barriers.
Design/methodology/approach
The emergency event tree analysis is combined with an interval type-2 fuzzy-set and analytic hierarchy process (AHP) method. In order to the quantitative data is not available, this study based on interval type2 fuzzy set theory, trapezoidal fuzzy numbers describe the expert's imprecise uncertainty about the fuzzy failure probability of emergency safety barriers related to the liquefied petroleum gas storage prevent. Fuzzy fault tree analysis and fuzzy ordered weighted average aggregation are used to address uncertainties in emergency safety barrier reliability assessment. In addition, a critical analysis and some corrective actions are suggested to identify weak points in emergency safety barriers. Therefore, a framework decisions are proposed to optimize and improve safety barrier reliability. Decision-making in this framework uses evidential reasoning theory to identify corrective actions that can optimize reliability based on subjective safety analysis.
Findings
A real case study of a liquefied petroleum gas storage in Algeria is presented to demonstrate the effectiveness of the proposed methodology. The results show that the proposed methodology provides the possibility to evaluate the values of the fuzzy failure probability of emergency safety barriers. In addition, the fuzzy failure probabilities using the fuzzy type-2 AHP method are the most reliable and accurate. As a result, the improved fault tree analysis can estimate uncertain expert opinion weights, identify and evaluate failure probability values for critical basic event. Therefore, suggestions for corrective measures to reduce the failure probability of the fire-fighting system are provided. The obtained results show that of the ten proposed corrective actions, the corrective action “use of periodic maintenance tests” prioritizes reliability, optimization and improvement of safety procedures.
Research limitations/implications
This study helps to determine the safest and most reliable corrective measures to improve the reliability of safety barriers. In addition, it also helps to protect people inside and outside the company from all kinds of major industrial accidents. Among the limitations of this study is that the cost of corrective actions is not taken into account.
Originality/value
Our contribution is to propose an integrated approach that uses interval type-2 fuzzy sets and AHP method and emergency event tree analysis to handle uncertainty in the failure probability assessment of emergency safety barriers. In addition, the integration of fault tree analysis and fuzzy ordered averaging aggregation helps to improve the reliability of the fire-fighting system and optimize the corrective actions that can improve the safety practices in liquefied petroleum gas storage tanks.
Details
Keywords
Hasina Tabassum Chowdhury, Shuva Ghosh, Shaim Mahamud, Fazlul Hasan Siddiqui and Sabah Binte Noor
The earth is facing challenges to work for the survival of human life during domino effect disasters. The emergency resource storage locations should be selected considering the…
Abstract
Purpose
The earth is facing challenges to work for the survival of human life during domino effect disasters. The emergency resource storage locations should be selected considering the probability of domino effect disasters. The first purpose of this study is to select the storage locations where domino effect probability is less. And second, facility development cost and transportation costs and costs for unutilized capacity have been optimized.
Design/methodology/approach
The work is a multiobjective optimization problem and solved with weighted sum approach. At first, the probabilities of domino effect due to natural disasters are calculated based on the earthquake zones. Then with that result along with other necessary data, the location to set up storage facilities and the quantities of resources that need to be transported has been determined.
Findings
The work targeted a country, Bangladesh for example. The authors have noticed that Bangladesh is currently storing relief items at warehouse which is under the domino effect prone region. The authors are proposing to avoid this location and identified the optimized cost for setting up the facilities. In this work, the authors pointed out which location has high probability of domino effect and after avoiding this location whether cost can be optimized, and the result demonstrated that this decision can be economical.
Originality/value
Disaster response authorities should try to take necessary proactive steps during cascading disasters. The novelty of this work is determining the locations to select storage facilities if the authors consider the probability of the domino effect. Then a facility location optimization model has been developed to minimize the costs. This paper can support policymakers to assess the strategies for selecting the location of emergency resource facilities.
Details
Keywords
Rajan Kumar Gangadhari, Vivek Khanzode, Shankar Murthy and Denis Dennehy
This paper aims to identify, prioritise and explore the relationships between the various barriers that are hindering the machine learning (ML) adaptation for analysing accident…
Abstract
Purpose
This paper aims to identify, prioritise and explore the relationships between the various barriers that are hindering the machine learning (ML) adaptation for analysing accident data information in the Indian petroleum industry.
Design/methodology/approach
The preferred reporting items for systematic reviews and meta-analysis (PRISMA) is initially used to identify key barriers as reported in extant literature. The decision-making trial and evaluation laboratory (DEMATEL) technique is then used to discover the interrelationships between the barriers, which are then prioritised, based on three criteria (time, cost and relative importance) using complex proportional assessment (COPRAS) and multi-objective optimisation method by ratio analysis (MOORA). The Delphi method is used to obtain and analyse data from 10 petroleum experts who work at various petroleum facilities in India.
Findings
The findings provide practical insights for management and accident data analysts to use ML techniques when analysing large amounts of data. The analysis of barriers will help organisations focus resources on the most significant obstacles to overcome barriers to adopt ML as the primary tool for accident data analysis, which can save time, money and enable the exploration of valuable insights from the data.
Originality/value
This is the first study to use a hybrid three-phase methodology and consult with domain experts in the petroleum industry to rank and analyse the relationship between these barriers.
Details
Keywords
Chien-Wen Shen and Phung Phi Tran
This study aims to provide a more complete picture of blockchain development by combining numerous methodologies with diverse data sources, such as academic papers and news…
Abstract
Purpose
This study aims to provide a more complete picture of blockchain development by combining numerous methodologies with diverse data sources, such as academic papers and news articles. This study displays the developmental status of each subject based on the interrelationships of each topic cluster by analyzing high-frequency keywords extracted from the collected data. Moreover, applying above methodologies will help understanding top research topics, authors, venues, institutes and countries. The differences of blockchain research and new are identified.
Design/methodology/approach
To identify and find blockchain development linkages, researchers have used search terms such as co-occurrence, bibliographic coupling, co-citation and co-authorship to help us understand the top research topics, authors, venues, institutes and countries. This study also used text mining analysis to identify blockchain articles' primary concepts and semantic structures.
Findings
The findings show the fundamental topics based on each topic cluster's links. While “technology”, “transaction”, “privacy and security”, “environment” and “consensus” were most strongly associated with blockchain in research, “platform”, “big data and cloud”, “network”, “healthcare and business” and “authentication” were closely tied to blockchain news. This article classifies blockchain principles into five patterns: hardware and infrastructure, data, networking, applications and consensus. These statistics helped the authors comprehend the top research topics, authors, venues, publication institutes and countries.
Research limitations/implications
Since Web of Science (WoS) and LexisNexis Academic data are used, the study has few sources. Others advise merging foreign datasets. WoS is one of the world's largest and most-used databases for assessing scientific papers.
Originality/value
This study has several uses and benefits. First, key concept discoveries can help academics understand blockchain research trends so they can prioritize research initiatives. Second, bibliographic coupling links academic papers on blockchain. It helps information seekers search and classify the material. Co-citation analysis results can help researchers identify potential partners and leaders in their field. The network's key organizations or countries should be proactive in discovering, proposing and creating new relationships with other organizations or countries, especially those from the journal network's border, to make the overall network more integrated and linked. Prominent members help recruit new authors to organizations or countries and link them to the co-authorship network. This study also used concept-linking analysis to identify blockchain articles' primary concepts and semantic structures. This may lead to new authors developing research ideas or subjects in primary disciplines of inquiry.
Details
Keywords
G. Citybabu and S. Yamini
This research aims to conduct a literature review of Lean Six Sigma (LSS) in the Indian context and related research publications and apply bibliometric analysis and the author's…
Abstract
Purpose
This research aims to conduct a literature review of Lean Six Sigma (LSS) in the Indian context and related research publications and apply bibliometric analysis and the author's visualization to map research trends in this area.
Design/methodology/approach
This article conducts a bibliometric analysis of LSS-related research in the Indian context using data gathered from Scopus and Web of Science databases from 2011 to 2022. The review provides information on LSS-related research in the Indian context and evaluates performance based on primary sources, authors, keywords, countries, affiliations, and documents. The analysis employs the Biblioshiny app and Bibliometrix R-tool for data analysis and scientific mapping.
Findings
The results of the bibliometric analysis indicate that the LSS culture has widely spread in India. The International Journal of Lean Six Sigma and Production Planning and Control were found to be the most productive sources for publishing LSS-related research articles. Antony J. was identified as the most active author in this field, contributing the most over the years. Among all organizations, NITs have conducted the most comprehensive research on LSS, indicating their significant investment of resources and efforts in studying this methodology and its applications in India. Additionally, the study examined the intellectual, social, and conceptual structures to identify implicit gaps and future research opportunities.
Practical implications
The findings of this study can inform academicians, researchers, practitioners, and policymakers about the state-of-the-art and the specifics of the most prolific studies. This study will facilitate their exploration of emerging research areas in LSS.
Originality/value
To the best of the authors knowledge, this is the first bibliometric analysis of LSS in the Indian context, providing an overview of relevant publications published between 2011 and 2022. This study analyzed 194 articles on LSS in India, which can help researchers and academics identify emerging research areas, suitable collaborators, and relevant journals for future publications.
Details
Keywords
Jialiang Xie, Shanli Zhang, Honghui Wang and Mingzhi Chen
With the rapid development of Internet technology, cybersecurity threats such as security loopholes, data leaks, network fraud, and ransomware have become increasingly prominent…
Abstract
Purpose
With the rapid development of Internet technology, cybersecurity threats such as security loopholes, data leaks, network fraud, and ransomware have become increasingly prominent, and organized and purposeful cyberattacks have increased, posing more challenges to cybersecurity protection. Therefore, reliable network risk assessment methods and effective network security protection schemes are urgently needed.
Design/methodology/approach
Based on the dynamic behavior patterns of attackers and defenders, a Bayesian network attack graph is constructed, and a multitarget risk dynamic assessment model is proposed based on network availability, network utilization impact and vulnerability attack possibility. Then, the self-organizing multiobjective evolutionary algorithm based on grey wolf optimization is proposed. And the authors use this algorithm to solve the multiobjective risk assessment model, and a variety of different attack strategies are obtained.
Findings
The experimental results demonstrate that the method yields 29 distinct attack strategies, and then attacker's preferences can be obtained according to these attack strategies. Furthermore, the method efficiently addresses the security assessment problem involving multiple decision variables, thereby providing constructive guidance for the construction of security network, security reinforcement and active defense.
Originality/value
A method for network risk assessment methods is given. And this study proposed a multiobjective risk dynamic assessment model based on network availability, network utilization impact and the possibility of vulnerability attacks. The example demonstrates the effectiveness of the method in addressing network security risks.
Details
Keywords
Panos T. Chountalas and Athanasios G. Lagodimos
Significant interest in Integrated Management Systems (IMS), as a key area within ISO-related Management System Standards (MSS) literature, has been evident from both academia and…
Abstract
Purpose
Significant interest in Integrated Management Systems (IMS), as a key area within ISO-related Management System Standards (MSS) literature, has been evident from both academia and industry over the past three decades. This study aims to map the evolution and current state of IMS research and propose possible directions for future studies.
Design/methodology/approach
A comprehensive content and bibliometric analysis of 846 documents from the Scopus database across the period 1995 to 2023 was conducted. This included performance analysis to track publication trends and identify key contributors, and content analysis to specify dominant research methodologies and the MSS most commonly integrated. Furthermore, science mapping techniques—such as co-authorship networks, keyword co-occurrence analysis, and bibliographic coupling—were utilized to outline the collaborative networks and the conceptual and intellectual structure of the field.
Findings
The study identifies three principal IMS research themes: the practical implementation of IMS, their role in promoting sustainability and social responsibility, and their impact on continuous performance improvement. It also highlights the field’s evolution and key research constituents—including influential works, prolific authors, leading academic institutions and countries, and top publishing journals. It further reveals that IMS research exhibits strong collaboration across authors and countries, and a rich methodological plurality, notably with a marked increase in empirical surveys in recent years. Additionally, it identifies the most frequently referenced MSS for integration, prominently featuring ISO 9001, ISO 14001, and ISO 45001/OHSAS 18001.
Originality/value
This study is original in its application of a dual analytical approach—bibliometric and content analysis—to provide a holistic overview of IMS research. It offers new insights into the integration of diverse MSS and proposes several promising paths for future research. Among the most prominent are standardizing IMS fundamental specifications, conducting more empirical research with advanced methods to evaluate the effects of MSS integration, providing practical support for organizations in IMS implementation through tailored methodologies and tools, and exploring the potential of Industry 4.0 and 5.0 technologies to advance IMS practices.
Details
Keywords
JiaMan Xing and Qianling Jiang
Since the introduction of the outstanding web AI chat system, ChatGPT, it has caused a significant impact in both academia and the business world. Many studies have started to…
Abstract
Purpose
Since the introduction of the outstanding web AI chat system, ChatGPT, it has caused a significant impact in both academia and the business world. Many studies have started to explore its potential applications in various fields. However, there is a lack of research from the perspective of user experience. To fill this theoretical gap and provide a theoretical basis for the operation and design of related services, this study plans to develop a set of evaluation scales for AI chat system user experience and explore the relationship between various factors and user satisfaction.
Design/methodology/approach
This study obtained 41 evaluation indicators through literature review and user research. Subsequently, these indicators were used as questionnaire items, combined with satisfaction metrics. A total of 515 questionnaires were distributed, and factor analysis and linear regression were employed to determine the specific elements influencing user experience and the user satisfaction model.
Findings
This study found that the factors influencing user experience are usefulness, accuracy, logical inference, interactivity, growth, anthropomorphism, convenience, credibility, ease of use, creativity, and security. Among these factors, only accuracy, anthropomorphism, creativity, and security indirectly influence satisfaction through usefulness, while the rest of the factors have a direct positive impact on user satisfaction.
Originality/value
This study provides constructive suggestions for the design and operation of related services and serves as a reference for future theoretical research in this area.
Details