Search results
1 – 10 of 18Dave C. Longhorn and John Dale Stobbs
This paper aims to propose two solution approaches to determine the number of ground transport vehicles that are required to ensure the on-time delivery of military equipment…
Abstract
Purpose
This paper aims to propose two solution approaches to determine the number of ground transport vehicles that are required to ensure the on-time delivery of military equipment between origin and destination node pairs in some geographic region, which is an important logistics problem at the US Transportation Command.
Design/methodology/approach
The author uses a mathematical program and a traditional heuristic to provide optimal and near-optimal solutions, respectively. The author also compares the approaches for random, small-scale problems to assess the quality and computational efficiency of the heuristic solution, and also uses the heuristic to solve a notional, large-scale problem typical of real problems.
Findings
This work helps analysts identify how many ground transport vehicles are needed to meet cargo delivery requirements in any military theater of operation.
Research limitations/implications
This research assumes all problem data is deterministic, so it does not capture variations in requirements or transit times between nodes.
Practical implications
This work provides prescriptive details to military analysts and decision-makers in a timely manner. Prior to this work, insights for this type of problem were generated using time-consuming simulation taking about a week and often involving trial-and-error.
Originality/value
This research provides new methods to solve an important logistics problem. The heuristic presented in this paper was recently used to provide operational insights about ground vehicle requirements to support a geographic combatant command and to inform decisions for railcar recapitalization within the US Army.
Details
Keywords
Johanna Innerhofer, Luigi Nasta and Anita Zehrer
Although the role of human capital in the hospitality sector is critical, the industry faces challenges in attracting workers with a poor industry image frequently mentioned…
Abstract
Purpose
Although the role of human capital in the hospitality sector is critical, the industry faces challenges in attracting workers with a poor industry image frequently mentioned regarding labor shortages. This research paper attempts to investigate the factors influencing labor shortages by presenting the perspectives of employees and employers.
Design/methodology/approach
Precisely 232 rural hospitality industry employees (n = 128) and employers (n = 104) in Northern Italy were surveyed using a written close-ended online survey and a quantitative research design as part of a convenience sampling approach. For hypotheses testing, Spearman's rho was used.
Findings
A relationship between the shortage of professional workers and a variety of factors was found, including professional, digital, social and green skills, industry-intrinsic characteristics and symbolic image attributes of the industry. The findings show that some factors are more important for employees, while others are more significant for employers.
Practical implications
This study demonstrates several practical implications for the hospitality sector by addressing the under-researched stakeholder group of existing hospitality employees, e.g. improving working conditions, reduction of manual operations through digital technologies, realistic career planning, employer branding, identification of skill deficiencies and provision of specialized trainings.
Originality/value
Most research on labor shortages in the hospitality industry has focused on the perspective of either employees or employers. This study compares both perspectives, including the industry image, to gain a realistic picture of the relevant factors for a rural tourism destination in Northern Italy.
Details
Keywords
Kavya Sharma, Xinhui Zhan, Fiona Fui-Hoon Nah, Keng Siau and Maggie X. Cheng
Phishing attacks are the most common cyber threats targeted at users. Digital nudging in the form of framing and priming may reduce user susceptibility to phishing. This research…
Abstract
Purpose
Phishing attacks are the most common cyber threats targeted at users. Digital nudging in the form of framing and priming may reduce user susceptibility to phishing. This research focuses on two types of digital nudging, framing and priming, and examines the impact of framing and priming on users' behavior (i.e. action) in a cybersecurity setting. It draws on prospect theory, instance-based learning theory and dual-process theory to generate the research hypotheses.
Design/methodology/approach
A 3 × 2 experimental study was carried out to test the hypotheses. The experiment consisted of three levels for framing (i.e. no framing, negative framing and positive framing) and two levels for priming (i.e. with and without priming).
Findings
The findings suggest that priming users to information security risks reduces their risk-taking behavior, whereas positive and negative framing of information security messages regarding potential consequences of the available choices do not change users' behavior. The results also indicate that risk-averse cybersecurity behavior is associated with greater confidence with the action, greater perceived severity of cybersecurity risks, lower perceived susceptibility to cybersecurity risks resulting from the action and lower trust in the download link.
Originality/value
This research shows that digital nudging in the form of priming is an effective way to reduce users' exposure to cybersecurity risks.
Details
Keywords
Mykola Makhortykh, Aleksandra Urman, Teresa Gil-Lopez and Roberto Ulloa
This study investigates perceptions of the use of online tracking, a passive data collection method relying on the automated recording of participant actions on desktop and mobile…
Abstract
Purpose
This study investigates perceptions of the use of online tracking, a passive data collection method relying on the automated recording of participant actions on desktop and mobile devices, for studying information behavior. It scrutinizes folk theories of tracking, the concerns tracking raises among the potential participants and design mechanisms that can be used to alleviate these concerns.
Design/methodology/approach
This study uses focus groups composed of university students (n = 13) to conduct an in-depth investigation of tracking perceptions in the context of information behavior research. Each focus group addresses three thematic blocks: (1) views on online tracking as a research technique, (2) concerns that influence participants' willingness to be tracked and (3) design mechanisms via which tracking-related concerns can be alleviated. To facilitate the discussion, each focus group combines open questions with card-sorting tasks. The results are analyzed using a combination of deductive content analysis and constant comparison analysis, with the main coding categories corresponding to the thematic blocks listed above.
Findings
The study finds that perceptions of tracking are influenced by recent data-related scandals (e.g. Cambridge Analytica), which have amplified negative attitudes toward tracking, which is viewed as a surveillance tool used by corporations and governments. This study also confirms the contextual nature of tracking-related concerns, which vary depending on the activities and content that are tracked. In terms of mechanisms used to address these concerns, this study highlights the importance of transparency-based mechanisms, particularly explanations dealing with the aims and methods of data collection, followed by privacy- and control-based mechanisms.
Originality/value
The study conducts a detailed examination of tracking perceptions and discusses how this research method can be used to increase engagement and empower participants involved in information behavior research.
Details