Search results

1 – 10 of 23
Article
Publication date: 30 April 2024

Andrew C. Billings

The purpose of this essay is to explore the ramifications of Web 3.0 on sports media and the desire for the ultimate fan experience.

Abstract

Purpose

The purpose of this essay is to explore the ramifications of Web 3.0 on sports media and the desire for the ultimate fan experience.

Design/methodology/approach

The essay explains how Web 3.0 will influence (1) the social TV experience, (2) the drive for zero latency in sports streaming, (3) the desire for exclusive sports memorabilia and experiences, (4) artificial intelligence-driven content and (5) the potential decentralization of certain elements within the sports media ecosphere.

Findings

The core fan experience will still be recognizable, but AI, VR, blockchain and other elements will be infused within it.

Originality/value

Ramifications on sports media scholarships are offered.

Details

International Journal of Sports Marketing and Sponsorship, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1464-6668

Keywords

Article
Publication date: 25 March 2024

Xiaoxia Zhang, Jin Zhang, Peiyan Du and Guohe Wang

In this paper, the brain potential changes caused by touching fabrics for handle evaluation were recorded by event related potential (ERP) method, compared with subjective…

Abstract

Purpose

In this paper, the brain potential changes caused by touching fabrics for handle evaluation were recorded by event related potential (ERP) method, compared with subjective evaluation scores and physical index of KES, explore the cognitive mechanism of the transformation of tactile sensation into neural impulses triggered by subtle mechanical stimuli such as material, texture, density and morphology in fabrics. By combining subjective evaluation of fabric tactile sensation, objective physical properties of fabrics and objective neurobiological signals, explore the neurophysiological mechanism of tactile cognition and the signal characteristics and time process of tactile information processing.

Design/methodology/approach

The ERP technology was first proposed by a British psychologist named Grey Walter. It is an imaging technique of noninvasive brain cognition, whose potential changes are related to the human physical and mental activities. ERP is different from electroencephalography (EEG) and evoked potentials (EP) on the fact that it cannot only record stimulated physical information which is transmitted to brain, but also response to the psychological activities which related to attention, identification, comparison, memory, judgment and cognition as well as to human’s neural physiological changes which are caused by cognitive process of the feeling by stimulation.

Findings

According to potential changes in the cerebral cortex evoked by touching four types of silk fabrics, human brain received the physical stimulation in the early stage (50 ms) of fabrics handle evaluation, and the P50 component amplitude showed negative correlation with fabric smoothness sensations. Around 200 ms after tactile stimulus onset, the amplitude of P200 component show positive correlation with the softness sensation of silk fabrics. The relationship between the amplitude of P300 and the sense of smoothness and softness need further evidence to proof.

Originality/value

In this paper, the brain potential changes caused by touching fabrics for handle evaluation were recorded by event related potential (ERP) method, compared with subjective evaluation scores and physical index of KES, the results shown that the maximum amplitude of P50 component evoked by fabric touching is related to the fabrics’ smoothness and roughness emotion, which means in the early stage processing of tactile sensation, the rougher fabrics could arouse more attention. In addition, the amplitude of P200 component shows positive correlation with the softness sensation of silk fabrics.

Details

International Journal of Clothing Science and Technology, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0955-6222

Keywords

Article
Publication date: 30 April 2024

C. Bharanidharan, S. Malathi and Hariprasath Manoharan

The potential of vehicle ad hoc networks (VANETs) to improve driver and passenger safety and security has made them a hot topic in the field of intelligent transportation systems…

Abstract

Purpose

The potential of vehicle ad hoc networks (VANETs) to improve driver and passenger safety and security has made them a hot topic in the field of intelligent transportation systems (ITSs). VANETs have different characteristics and system architectures from mobile ad hoc networks (MANETs), with a primary focus on vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communication. But protecting VANETs from malicious assaults is crucial because they can undermine network security and safety.

Design/methodology/approach

The black hole attack is a well-known danger to VANETs. It occurs when a hostile node introduces phony routing tables into the network, potentially damaging it and interfering with communication. A safe ad hoc on-demand distance vector (AODV) routing protocol has been created in response to this issue. By adding cryptographic features for source and target node verification to the route request (RREQ) and route reply (RREP) packets, this protocol improves upon the original AODV routing system.

Findings

Through the use of cryptographic-based encryption and decryption techniques, the suggested method fortifies the VANET connection. In addition, other network metrics are taken into account to assess the effectiveness of the secure AODV routing protocol under black hole attacks, including packet loss, end-to-end latency, packet delivery ratio (PDR) and routing request overhead. Results from simulations using an NS-2.33 simulator show how well the suggested fix works to enhance system performance and lessen the effects of black hole assaults on VANETs.

Originality/value

All things considered, the safe AODV routing protocol provides a strong method for improving security and dependability in VANET systems, protecting against malevolent attacks and guaranteeing smooth communication between cars and infrastructure.

Details

International Journal of Intelligent Unmanned Systems, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2049-6427

Keywords

Article
Publication date: 7 March 2024

Fulya Acikgoz, Nikolaos Stylos and Sophie Lythreatis

The purpose of this study synthesises the body of research revolving around blockchain technology (BCT) whilst drawing on the technology-organization-environment framework…

Abstract

Purpose

The purpose of this study synthesises the body of research revolving around blockchain technology (BCT) whilst drawing on the technology-organization-environment framework, resource-based theory and theory of constraints, to conceptualize capabilities (enablers) and constraints (barriers) of BCT in the hospitality and tourism (H&T) industry.

Design/methodology/approach

A systematic literature review of BCT in the hotel and tourism industry has been achieved through two databases, i.e. Scopus and Web of Science. From 544 articles selected between the years 2008 and 2023 (first quarter), a sample of 49 articles was used to structure existing research on this subject.

Findings

The findings of this systematic literature review of BCT in the H&T literature establish a solid groundwork for assessing the evolution of this research area over time. Findings are classified into two groups: capabilities (enablers) and constraints (barriers) of BCT based on publication year, different research methods, theoretical underpinnings and applicable contexts.

Originality/value

To the best of the authors’ knowledge, this is one of the first attempts to synthesize studies related to BCT in H&T research by combining three theoretical approaches. It serves as a foundation to evaluate the development of BCT studies in this field.

Details

International Journal of Contemporary Hospitality Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0959-6119

Keywords

Article
Publication date: 30 April 2024

Jacqueline Humphries, Pepijn Van de Ven, Nehal Amer, Nitin Nandeshwar and Alan Ryan

Maintaining the safety of the human is a major concern in factories where humans co-exist with robots and other physical tools. Typically, the area around the robots is monitored…

Abstract

Purpose

Maintaining the safety of the human is a major concern in factories where humans co-exist with robots and other physical tools. Typically, the area around the robots is monitored using lasers. However, lasers cannot distinguish between human and non-human objects in the robot’s path. Stopping or slowing down the robot when non-human objects approach is unproductive. This research contribution addresses that inefficiency by showing how computer-vision techniques can be used instead of lasers which improve up-time of the robot.

Design/methodology/approach

A computer-vision safety system is presented. Image segmentation, 3D point clouds, face recognition, hand gesture recognition, speed and trajectory tracking and a digital twin are used. Using speed and separation, the robot’s speed is controlled based on the nearest location of humans accurate to their body shape. The computer-vision safety system is compared to a traditional laser measure. The system is evaluated in a controlled test, and in the field.

Findings

Computer-vision and lasers are shown to be equivalent by a measure of relationship and measure of agreement. R2 is given as 0.999983. The two methods are systematically producing similar results, as the bias is close to zero, at 0.060 mm. Using Bland–Altman analysis, 95% of the differences lie within the limits of maximum acceptable differences.

Originality/value

In this paper an original model for future computer-vision safety systems is described which is equivalent to existing laser systems, identifies and adapts to particular humans and reduces the need to slow and stop systems thereby improving efficiency. The implication is that computer-vision can be used to substitute lasers and permit adaptive robotic control in human–robot collaboration systems.

Details

Technological Sustainability, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2754-1312

Keywords

Article
Publication date: 25 April 2024

Jayme Stewart, Jessie Swanek and Adelle Forth

Despite representing a relatively small portion of the population, those who experience repeat victimization make up a significant share of all sexual and violent crimes, implying…

Abstract

Purpose

Despite representing a relatively small portion of the population, those who experience repeat victimization make up a significant share of all sexual and violent crimes, implying that perpetrators target them repeatedly. Indeed, research reveals specific traits (e.g. submissiveness) and behaviors (e.g. gait) related to past victimization or vulnerability. The purpose of this study is to explore the link between personality traits, self-assessed vulnerability and nonverbal cues.

Design/methodology/approach

In all, 40 undergraduate Canadian women were videotaped while recording a dating profile. Self-report measures of assertiveness, personality traits and vulnerability ratings for future sexual or violent victimization were obtained following the video-recording. The videotape was coded for nonverbal behaviors that have been related to assertiveness or submissiveness.

Findings

Self-perceived sexual vulnerability correlated with reduced assertiveness and dominance and increased emotionality (e.g. fear and anxiety). Additionally, nonverbal behaviors differed based on personality traits: self-touch was linked to lower assertiveness, dominance and extraversion and higher submissiveness, emotionality and warm-agreeableness.

Originality/value

To the best of the authors’ knowledge, this is the first study of its kind to consider the relationships between personality, self-perceived vulnerability and nonverbal behaviors among college-aged women. Potential implications, including enhancing autonomy and self-efficacy, are discussed.

Details

Journal of Criminal Psychology, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2009-3829

Keywords

Article
Publication date: 5 April 2024

Diyana Sheharee Ranasinghe and Navodana Rodrigo

Blockchain for energy trading is a trending research area in the current context. However, a noticeable gap exists in the review articles focussing on solar energy trading with…

Abstract

Purpose

Blockchain for energy trading is a trending research area in the current context. However, a noticeable gap exists in the review articles focussing on solar energy trading with blockchain technology. Thus, this study aims to systematically examine and synthesise the existing research on implementing blockchain technology in sustainable solar energy trading.

Design/methodology/approach

The study pursued a systematic literature review to achieve its aim. The data extraction process focussed on the Scopus and Web of Science (WoS) databases, yielding an initial set of 129 articles. Subsequent screening and removal of duplicates led to 87 articles for bibliometric analysis, utilising VOSviewer software to discern evolutionary progress in the field. Following the establishment of inclusion and exclusion criteria, a manual content analysis was conducted on a subset of 19 articles.

Findings

The results indicated a rising interest in publications on solar energy trading with blockchain technology. Some studies are exploring the integration of new technologies like machine learning and artificial intelligence in this domain. However, challenges and limitations were identified, such as the absence of real-world solar energy trading projects.

Originality/value

This study offers a distinctive approach by integrating bibliometric and manual content analyses, a methodology seldom explored. It provides valuable recommendations for academia and industry, influencing future research and industry practices. Insights include integrating blockchain into solar energy trading and addressing knowledge gaps. These findings advance societal goals, such as transitioning to renewable energy sources (RES) and mitigating carbon emissions, fostering a sustainable future.

Details

Smart and Sustainable Built Environment, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2046-6099

Keywords

Open Access
Article
Publication date: 8 March 2024

Camila Alvarenga and Cicero Braga

In Brazil, over 4.7 million women enrolled in university in the year 2017. However, Brazilian women have been consistently overrepresented in humanities and care majors and…

Abstract

Purpose

In Brazil, over 4.7 million women enrolled in university in the year 2017. However, Brazilian women have been consistently overrepresented in humanities and care majors and underrepresented in science, technology, engineering and mathematics (STEM). Given that observed gender differences in math-intensive fields have lasting effects on gender inequality in the labor market, and that observed gender variations do not necessarily associate with differences in innate ability, in this paper we explore the paths of societal gender bias and gender differences in a Brazilian university.

Design/methodology/approach

We conduct a social experiment at a University in Southeastern Brazil, applying the gender-STEM Implicit Association Test.

Findings

We found that women in STEM are less likely to show gender-STEM implicit stereotypes, compared to women in humanities. The results indicate a negative correlation between implicit gender stereotyping and the choice of math-intensive majors by women.

Originality/value

The stereotype-congruent results are indicative of the gender bias in Brazilian society, and suggest that stereotypes created at early stages in life are directly related to future outcomes that reinforce gender disparities in Brazil, which can be observed in career choices.

Details

EconomiA, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1517-7580

Keywords

Article
Publication date: 20 February 2024

Winston T. Su, Zach W.Y. Lee, Xinming He and Tommy K.H. Chan

The global market for cloud gaming is growing rapidly. How gamers evaluate the service quality of this emerging form of cloud service has become a critical issue for both…

170

Abstract

Purpose

The global market for cloud gaming is growing rapidly. How gamers evaluate the service quality of this emerging form of cloud service has become a critical issue for both researchers and practitioners. Building on the literature on service quality and software as a service, this study develops and validates a gamer-centric measurement instrument for cloud gaming service quality.

Design/methodology/approach

A three-step measurement instrument development process, including item generation, scale development and instrument testing, was adopted to conceptualize and operationalize cloud gaming service quality.

Findings

Cloud gaming service quality consists of two second-order constructs of support service quality and technical service quality with seven first-order dimensions, namely rapport, responsiveness, reliability, compatibility, ubiquity, smoothness and comprehensiveness. The instrument exhibits desirable psychometric properties.

Practical implications

Practitioners can use this new measurement instrument to evaluate gamers' perceptions toward their service and to identify areas for improvement.

Originality/value

This study contributes to the service quality literature by utilizing qualitative and quantitative approaches to develop and validate a new measurement instrument of service quality in the context of cloud gaming and by identifying new dimensions (compatibility, ubiquity, smoothness and comprehensiveness) specific to it.

Details

Internet Research, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 4 April 2024

Andrew Reeves, Malcolm Pattinson and Marcus Butavicius

The purpose of this study is to investigate the extent to which a sample of the Australian cybersecurity industry is impacted by burnout.

Abstract

Purpose

The purpose of this study is to investigate the extent to which a sample of the Australian cybersecurity industry is impacted by burnout.

Design/methodology/approach

Based on the review of the literature, this research investigates the following three hypotheses. Gender will significantly predict burnout scores. Those who identify as women will score higher on average than those who identify as men (because of being in a male-dominated industry). Self-reported burnout will differ across job roles. In addition, the authors expect these relationships to hold across the three dimensions of burnout, namely, emotional exhaustion, depersonalisation and professional efficacy. Sleep quality will be associated with burnout.

Findings

Gender and job role were significant predictors of emotional exhaustion, but not depersonalisation or professional efficacy. The interaction between gender and job role was also significant. Senior managers experienced poorer quality sleep, and poorer sleep quality was associated with greater reported emotional exhaustion at work. For emotional exhaustion, female respondents who worked in security consultant roles tended to score higher than their male counterparts.

Practical implications

Left unaddressed, the high level of workplace burnout may add to the well-being and retention problems developing within the cybersecurity community. These results indicate that organisations should look to measure the well-being of their own cyber workforce and implement meaningful changes if they wish to keep their cyber talent and enable them to thrive at work.

Originality/value

This research paper is an extension of a previous paper by the same authors which is titled “Is Your CISO Burnt Out Yet”. This paper examined the demographic differences in workplace burnout among cybersecurity professionals.

Details

Information & Computer Security, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2056-4961

Keywords

Access

Year

Last 3 months (23)

Content type

Earlycite article (23)
1 – 10 of 23