Search results

1 – 10 of 51
Article
Publication date: 5 June 2023

Rishabh Rathore, Jitesh Thakkar and J.K. Jha

This paper investigates the overall system risk for a foodgrains supply chain capturing the interrelationship among the risk factors and the effect of risk mitigation strategies.

Abstract

Purpose

This paper investigates the overall system risk for a foodgrains supply chain capturing the interrelationship among the risk factors and the effect of risk mitigation strategies.

Design/methodology/approach

This paper first calculates the weight of risk factors using an integrated approach of failure mode, effects analysis and fuzzy VIKOR technique. Next, the weights are utilized as input for the weighted fuzzy Petri-net (WFPN) approach to calculate the system risk.

Findings

Two different WFPN models are developed based on the relationships among the risk factors, and both models demonstrate a higher risk value for the overall system.

Originality/value

The proposed methodology will help practitioners or managers understand the complexity involved in the system by capturing the interrelationship behaviour. This study also considers the concurrent effect of risk mitigation strategies for calculating the overall system risk, which helps to improve the system’s performance.

Details

International Journal of Productivity and Performance Management, vol. 73 no. 5
Type: Research Article
ISSN: 1741-0401

Keywords

Book part
Publication date: 24 November 2023

Alex Anlesinya and Samuel Ato Dadzie

The use of structured literature review methods like bibliometric analysis is growing in the management fields, but there is limited knowledge on how they can be facilitated by…

Abstract

The use of structured literature review methods like bibliometric analysis is growing in the management fields, but there is limited knowledge on how they can be facilitated by technology. Hence, we conducted a broad overview of software tools, their roles, and limitations in structured (bibliometric) literature reviewing activities. Subsequently, we show that several software tools are freely available to aid in searching the literature, identifying/ extracting relevant publications, screening/assessing quality of the extracted data, and performing analyses to generate insights from the literature. However, their applications may be confronted with several challenges such as limited analytical and functional capabilities, inadequate technological skills of researchers, and the fact that the researcher's insights are still needed to generate compelling conclusions from the results produced by software tools. Consequently, we contribute toward advancing the methodologies for performing structured reviews by providing a comprehensive and updated overview of the knowledge base of key technological software tools and the conduct of structured or bibliometric literature reviews.

Details

Advancing Methodologies of Conducting Literature Review in Management Domain
Type: Book
ISBN: 978-1-80262-372-7

Keywords

Article
Publication date: 28 April 2023

Daas Samia and Innal Fares

This study aims to improve the reliability of emergency safety barriers by using the subjective safety analysis based on evidential reasoning theory in order to develop on a…

Abstract

Purpose

This study aims to improve the reliability of emergency safety barriers by using the subjective safety analysis based on evidential reasoning theory in order to develop on a framework for optimizing the reliability of emergency safety barriers.

Design/methodology/approach

The emergency event tree analysis is combined with an interval type-2 fuzzy-set and analytic hierarchy process (AHP) method. In order to the quantitative data is not available, this study based on interval type2 fuzzy set theory, trapezoidal fuzzy numbers describe the expert's imprecise uncertainty about the fuzzy failure probability of emergency safety barriers related to the liquefied petroleum gas storage prevent. Fuzzy fault tree analysis and fuzzy ordered weighted average aggregation are used to address uncertainties in emergency safety barrier reliability assessment. In addition, a critical analysis and some corrective actions are suggested to identify weak points in emergency safety barriers. Therefore, a framework decisions are proposed to optimize and improve safety barrier reliability. Decision-making in this framework uses evidential reasoning theory to identify corrective actions that can optimize reliability based on subjective safety analysis.

Findings

A real case study of a liquefied petroleum gas storage in Algeria is presented to demonstrate the effectiveness of the proposed methodology. The results show that the proposed methodology provides the possibility to evaluate the values of the fuzzy failure probability of emergency safety barriers. In addition, the fuzzy failure probabilities using the fuzzy type-2 AHP method are the most reliable and accurate. As a result, the improved fault tree analysis can estimate uncertain expert opinion weights, identify and evaluate failure probability values for critical basic event. Therefore, suggestions for corrective measures to reduce the failure probability of the fire-fighting system are provided. The obtained results show that of the ten proposed corrective actions, the corrective action “use of periodic maintenance tests” prioritizes reliability, optimization and improvement of safety procedures.

Research limitations/implications

This study helps to determine the safest and most reliable corrective measures to improve the reliability of safety barriers. In addition, it also helps to protect people inside and outside the company from all kinds of major industrial accidents. Among the limitations of this study is that the cost of corrective actions is not taken into account.

Originality/value

Our contribution is to propose an integrated approach that uses interval type-2 fuzzy sets and AHP method and emergency event tree analysis to handle uncertainty in the failure probability assessment of emergency safety barriers. In addition, the integration of fault tree analysis and fuzzy ordered averaging aggregation helps to improve the reliability of the fire-fighting system and optimize the corrective actions that can improve the safety practices in liquefied petroleum gas storage tanks.

Details

International Journal of Quality & Reliability Management, vol. 41 no. 1
Type: Research Article
ISSN: 0265-671X

Keywords

Open Access
Article
Publication date: 19 April 2023

Hasina Tabassum Chowdhury, Shuva Ghosh, Shaim Mahamud, Fazlul Hasan Siddiqui and Sabah Binte Noor

The earth is facing challenges to work for the survival of human life during domino effect disasters. The emergency resource storage locations should be selected considering the…

Abstract

Purpose

The earth is facing challenges to work for the survival of human life during domino effect disasters. The emergency resource storage locations should be selected considering the probability of domino effect disasters. The first purpose of this study is to select the storage locations where domino effect probability is less. And second, facility development cost and transportation costs and costs for unutilized capacity have been optimized.

Design/methodology/approach

The work is a multiobjective optimization problem and solved with weighted sum approach. At first, the probabilities of domino effect due to natural disasters are calculated based on the earthquake zones. Then with that result along with other necessary data, the location to set up storage facilities and the quantities of resources that need to be transported has been determined.

Findings

The work targeted a country, Bangladesh for example. The authors have noticed that Bangladesh is currently storing relief items at warehouse which is under the domino effect prone region. The authors are proposing to avoid this location and identified the optimized cost for setting up the facilities. In this work, the authors pointed out which location has high probability of domino effect and after avoiding this location whether cost can be optimized, and the result demonstrated that this decision can be economical.

Originality/value

Disaster response authorities should try to take necessary proactive steps during cascading disasters. The novelty of this work is determining the locations to select storage facilities if the authors consider the probability of the domino effect. Then a facility location optimization model has been developed to minimize the costs. This paper can support policymakers to assess the strategies for selecting the location of emergency resource facilities.

Details

Journal of Humanitarian Logistics and Supply Chain Management, vol. 13 no. 4
Type: Research Article
ISSN: 2042-6747

Keywords

Article
Publication date: 6 September 2022

Rajan Kumar Gangadhari, Vivek Khanzode, Shankar Murthy and Denis Dennehy

This paper aims to identify, prioritise and explore the relationships between the various barriers that are hindering the machine learning (ML) adaptation for analysing accident…

Abstract

Purpose

This paper aims to identify, prioritise and explore the relationships between the various barriers that are hindering the machine learning (ML) adaptation for analysing accident data information in the Indian petroleum industry.

Design/methodology/approach

The preferred reporting items for systematic reviews and meta-analysis (PRISMA) is initially used to identify key barriers as reported in extant literature. The decision-making trial and evaluation laboratory (DEMATEL) technique is then used to discover the interrelationships between the barriers, which are then prioritised, based on three criteria (time, cost and relative importance) using complex proportional assessment (COPRAS) and multi-objective optimisation method by ratio analysis (MOORA). The Delphi method is used to obtain and analyse data from 10 petroleum experts who work at various petroleum facilities in India.

Findings

The findings provide practical insights for management and accident data analysts to use ML techniques when analysing large amounts of data. The analysis of barriers will help organisations focus resources on the most significant obstacles to overcome barriers to adopt ML as the primary tool for accident data analysis, which can save time, money and enable the exploration of valuable insights from the data.

Originality/value

This is the first study to use a hybrid three-phase methodology and consult with domain experts in the petroleum industry to rank and analyse the relationship between these barriers.

Details

Benchmarking: An International Journal, vol. 30 no. 9
Type: Research Article
ISSN: 1463-5771

Keywords

Article
Publication date: 16 October 2023

Chien-Wen Shen and Phung Phi Tran

This study aims to provide a more complete picture of blockchain development by combining numerous methodologies with diverse data sources, such as academic papers and news…

Abstract

Purpose

This study aims to provide a more complete picture of blockchain development by combining numerous methodologies with diverse data sources, such as academic papers and news articles. This study displays the developmental status of each subject based on the interrelationships of each topic cluster by analyzing high-frequency keywords extracted from the collected data. Moreover, applying above methodologies will help understanding top research topics, authors, venues, institutes and countries. The differences of blockchain research and new are identified.

Design/methodology/approach

To identify and find blockchain development linkages, researchers have used search terms such as co-occurrence, bibliographic coupling, co-citation and co-authorship to help us understand the top research topics, authors, venues, institutes and countries. This study also used text mining analysis to identify blockchain articles' primary concepts and semantic structures.

Findings

The findings show the fundamental topics based on each topic cluster's links. While “technology”, “transaction”, “privacy and security”, “environment” and “consensus” were most strongly associated with blockchain in research, “platform”, “big data and cloud”, “network”, “healthcare and business” and “authentication” were closely tied to blockchain news. This article classifies blockchain principles into five patterns: hardware and infrastructure, data, networking, applications and consensus. These statistics helped the authors comprehend the top research topics, authors, venues, publication institutes and countries.

Research limitations/implications

Since Web of Science (WoS) and LexisNexis Academic data are used, the study has few sources. Others advise merging foreign datasets. WoS is one of the world's largest and most-used databases for assessing scientific papers.

Originality/value

This study has several uses and benefits. First, key concept discoveries can help academics understand blockchain research trends so they can prioritize research initiatives. Second, bibliographic coupling links academic papers on blockchain. It helps information seekers search and classify the material. Co-citation analysis results can help researchers identify potential partners and leaders in their field. The network's key organizations or countries should be proactive in discovering, proposing and creating new relationships with other organizations or countries, especially those from the journal network's border, to make the overall network more integrated and linked. Prominent members help recruit new authors to organizations or countries and link them to the co-authorship network. This study also used concept-linking analysis to identify blockchain articles' primary concepts and semantic structures. This may lead to new authors developing research ideas or subjects in primary disciplines of inquiry.

Details

Library Hi Tech, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0737-8831

Keywords

Article
Publication date: 28 July 2023

G. Citybabu and S. Yamini

This research aims to conduct a literature review of Lean Six Sigma (LSS) in the Indian context and related research publications and apply bibliometric analysis and the author's…

Abstract

Purpose

This research aims to conduct a literature review of Lean Six Sigma (LSS) in the Indian context and related research publications and apply bibliometric analysis and the author's visualization to map research trends in this area.

Design/methodology/approach

This article conducts a bibliometric analysis of LSS-related research in the Indian context using data gathered from Scopus and Web of Science databases from 2011 to 2022. The review provides information on LSS-related research in the Indian context and evaluates performance based on primary sources, authors, keywords, countries, affiliations, and documents. The analysis employs the Biblioshiny app and Bibliometrix R-tool for data analysis and scientific mapping.

Findings

The results of the bibliometric analysis indicate that the LSS culture has widely spread in India. The International Journal of Lean Six Sigma and Production Planning and Control were found to be the most productive sources for publishing LSS-related research articles. Antony J. was identified as the most active author in this field, contributing the most over the years. Among all organizations, NITs have conducted the most comprehensive research on LSS, indicating their significant investment of resources and efforts in studying this methodology and its applications in India. Additionally, the study examined the intellectual, social, and conceptual structures to identify implicit gaps and future research opportunities.

Practical implications

The findings of this study can inform academicians, researchers, practitioners, and policymakers about the state-of-the-art and the specifics of the most prolific studies. This study will facilitate their exploration of emerging research areas in LSS.

Originality/value

To the best of the authors knowledge, this is the first bibliometric analysis of LSS in the Indian context, providing an overview of relevant publications published between 2011 and 2022. This study analyzed 194 articles on LSS in India, which can help researchers and academics identify emerging research areas, suitable collaborators, and relevant journals for future publications.

Details

The TQM Journal, vol. 36 no. 7
Type: Research Article
ISSN: 1754-2731

Keywords

Article
Publication date: 16 August 2023

Jialiang Xie, Shanli Zhang, Honghui Wang and Mingzhi Chen

With the rapid development of Internet technology, cybersecurity threats such as security loopholes, data leaks, network fraud, and ransomware have become increasingly prominent…

Abstract

Purpose

With the rapid development of Internet technology, cybersecurity threats such as security loopholes, data leaks, network fraud, and ransomware have become increasingly prominent, and organized and purposeful cyberattacks have increased, posing more challenges to cybersecurity protection. Therefore, reliable network risk assessment methods and effective network security protection schemes are urgently needed.

Design/methodology/approach

Based on the dynamic behavior patterns of attackers and defenders, a Bayesian network attack graph is constructed, and a multitarget risk dynamic assessment model is proposed based on network availability, network utilization impact and vulnerability attack possibility. Then, the self-organizing multiobjective evolutionary algorithm based on grey wolf optimization is proposed. And the authors use this algorithm to solve the multiobjective risk assessment model, and a variety of different attack strategies are obtained.

Findings

The experimental results demonstrate that the method yields 29 distinct attack strategies, and then attacker's preferences can be obtained according to these attack strategies. Furthermore, the method efficiently addresses the security assessment problem involving multiple decision variables, thereby providing constructive guidance for the construction of security network, security reinforcement and active defense.

Originality/value

A method for network risk assessment methods is given. And this study proposed a multiobjective risk dynamic assessment model based on network availability, network utilization impact and the possibility of vulnerability attacks. The example demonstrates the effectiveness of the method in addressing network security risks.

Details

International Journal of Intelligent Computing and Cybernetics, vol. 17 no. 1
Type: Research Article
ISSN: 1756-378X

Keywords

Article
Publication date: 13 August 2024

Panos T. Chountalas and Athanasios G. Lagodimos

Significant interest in Integrated Management Systems (IMS), as a key area within ISO-related Management System Standards (MSS) literature, has been evident from both academia and…

Abstract

Purpose

Significant interest in Integrated Management Systems (IMS), as a key area within ISO-related Management System Standards (MSS) literature, has been evident from both academia and industry over the past three decades. This study aims to map the evolution and current state of IMS research and propose possible directions for future studies.

Design/methodology/approach

A comprehensive content and bibliometric analysis of 846 documents from the Scopus database across the period 1995 to 2023 was conducted. This included performance analysis to track publication trends and identify key contributors, and content analysis to specify dominant research methodologies and the MSS most commonly integrated. Furthermore, science mapping techniques—such as co-authorship networks, keyword co-occurrence analysis, and bibliographic coupling—were utilized to outline the collaborative networks and the conceptual and intellectual structure of the field.

Findings

The study identifies three principal IMS research themes: the practical implementation of IMS, their role in promoting sustainability and social responsibility, and their impact on continuous performance improvement. It also highlights the field’s evolution and key research constituents—including influential works, prolific authors, leading academic institutions and countries, and top publishing journals. It further reveals that IMS research exhibits strong collaboration across authors and countries, and a rich methodological plurality, notably with a marked increase in empirical surveys in recent years. Additionally, it identifies the most frequently referenced MSS for integration, prominently featuring ISO 9001, ISO 14001, and ISO 45001/OHSAS 18001.

Originality/value

This study is original in its application of a dual analytical approach—bibliometric and content analysis—to provide a holistic overview of IMS research. It offers new insights into the integration of diverse MSS and proposes several promising paths for future research. Among the most prominent are standardizing IMS fundamental specifications, conducting more empirical research with advanced methods to evaluate the effects of MSS integration, providing practical support for organizations in IMS implementation through tailored methodologies and tools, and exploring the potential of Industry 4.0 and 5.0 technologies to advance IMS practices.

Article
Publication date: 7 May 2024

JiaMan Xing and Qianling Jiang

Since the introduction of the outstanding web AI chat system, ChatGPT, it has caused a significant impact in both academia and the business world. Many studies have started to…

Abstract

Purpose

Since the introduction of the outstanding web AI chat system, ChatGPT, it has caused a significant impact in both academia and the business world. Many studies have started to explore its potential applications in various fields. However, there is a lack of research from the perspective of user experience. To fill this theoretical gap and provide a theoretical basis for the operation and design of related services, this study plans to develop a set of evaluation scales for AI chat system user experience and explore the relationship between various factors and user satisfaction.

Design/methodology/approach

This study obtained 41 evaluation indicators through literature review and user research. Subsequently, these indicators were used as questionnaire items, combined with satisfaction metrics. A total of 515 questionnaires were distributed, and factor analysis and linear regression were employed to determine the specific elements influencing user experience and the user satisfaction model.

Findings

This study found that the factors influencing user experience are usefulness, accuracy, logical inference, interactivity, growth, anthropomorphism, convenience, credibility, ease of use, creativity, and security. Among these factors, only accuracy, anthropomorphism, creativity, and security indirectly influence satisfaction through usefulness, while the rest of the factors have a direct positive impact on user satisfaction.

Originality/value

This study provides constructive suggestions for the design and operation of related services and serves as a reference for future theoretical research in this area.

Details

Kybernetes, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0368-492X

Keywords

1 – 10 of 51