Search results

1 – 6 of 6
Article
Publication date: 28 October 2014

Sardar Kashif Ashraf Khan, Jonathan Loo, Aboubaker Lasebae, Muhammad Awais Azam, Muhammad Adeel, Rehana Kausar and Humaira Sardar

This paper aims to propose an algorithm, location-aware opportunistic content forwarding (LOC), to improve message directivity using direction vectors in opportunistic networks…

Abstract

Purpose

This paper aims to propose an algorithm, location-aware opportunistic content forwarding (LOC), to improve message directivity using direction vectors in opportunistic networks. The LOC is based on the assumption that if approximate location of the destination node is known, then overall message delivery and cost can be improved. Efficient message delivery with low communication cost is a major challenge in current opportunistic networks. In these networks, nodes do not have prior knowledge of their recipients, and message forwarding can be achieved by selecting suitable forwarder based on some forwarding criteria, as compared to its ancestor mobile ad hoc networks.

Design/methodology/approach

In this paper, the authors tested LOC in two sets of mobility models, synthetic movement model and real mobility data sets. In the first set, working day movement is used as synthetic movement model, where proposed algorithm is compared against Lobby Influence (LI) and Epidemic algorithms. In the second set of experiments, the new algorithm is tested in three mobility data sets, namely, Cambridge, Reality and Sassy, and results compared against LI algorithm. The reason of using various movement models is to establish strengths and weaknesses of the proposed algorithm in different scenarios.

Findings

The experimental results show that the new algorithm performed extremely well in different scenarios, not only in terms of overall message delivery but also successfully managed to reduce the communication cost.

Originality/value

The new contribution increases the overall energy and storage efficiency of nodes by targeting relevant forwarding nodes in the network.

Details

International Journal of Pervasive Computing and Communications, vol. 10 no. 4
Type: Research Article
ISSN: 1742-7371

Keywords

Content available
Article
Publication date: 28 October 2014

Ismail Khalil and Liming Chen

108

Abstract

Details

International Journal of Pervasive Computing and Communications, vol. 10 no. 4
Type: Research Article
ISSN: 1742-7371

Article
Publication date: 13 November 2017

Pramod Iyer, Atefeh Yazdanparast and David Strutton

Political marketing is unable to reach out or influence voters as it once did. This study aims to identify means for political marketers to effectively reach to voters…

2385

Abstract

Purpose

Political marketing is unable to reach out or influence voters as it once did. This study aims to identify means for political marketers to effectively reach to voters. Specifically, this study examines the role of different WOM/e-WOM political messages (shallow vs deep) delivered through various communication channels on voters’ message evaluation, believability, attitude towards the message and communication, message involvement, voting intentions and WOM/e-WOM intentions.

Design/methodology/approach

Two experimental design studies were conducted to test the research hypotheses. Data were collected from age-based voting cohorts through snowball sampling and online consumer panels.

Findings

The results suggest that political WOM/e-WOM messages received via different communication modes are perceived differently by age-based voting cohorts in terms of message evaluation, believability and attitudinal dispositions. The perceived credibility of the communication source makes a difference in such evaluations and dispositions. Also, the complexity of message impacts behavioral intentions of age-based voting cohorts differently. Older (younger) voter cohorts are more receptive to complex and detailed (short and brief) messages. Political message involvement mediates the relationship between message believability and voting intentions, as well as WOM/e-WOM intentions.

Research limitations/implications

The results are limited in terms of generalizability due to the experimental nature of the studies. Future research may seek to use actual candidates and examine the effects of moderators such as the cognition-based needs of respondents to engage in central or peripheral processing.

Practical implications

Political marketers can achieve greater credibility and effectiveness and partially restore political marketing’s reputation by honoring three guidelines: construct shallower (or deeper) political marketing messages when targeting younger (or older) voting cohorts through internet-connected (or traditional) delivery modes.

Originality/value

This paper explores an important but under-researched area in political marketing (i.e. the use of WOM/e-WOM messages in political marketing) and identifies important differences in attitudinal and behavioral dispositions of age-based voting cohorts impacted by the choice of communication mode and message complexity. Moreover, the perceived credibility of the communication source (sender) can sway communication mode preferences for age-based voting cohorts.

Details

Journal of Consumer Marketing, vol. 34 no. 7
Type: Research Article
ISSN: 0736-3761

Keywords

Article
Publication date: 6 June 2016

Ema Kusen and Mark Strembeck

Ever since Mark Weiser coined the term “ubiquitous computing” (ubicomp) in 1988, there has been a general interest in proposing various solutions that would support his vision…

Abstract

Purpose

Ever since Mark Weiser coined the term “ubiquitous computing” (ubicomp) in 1988, there has been a general interest in proposing various solutions that would support his vision. However, attacks targeting devices and services of a ubicomp environment have demonstrated not only different privacy issues, but also a risk of endangering user’s life (e.g. by modifying medical sensor readings). Thus, the aim of this paper is to provide a comprehensive overview of security challenges of ubicomp environments and the corresponding countermeasures proposed over the past decade.

Design/methodology/approach

The results of this paper are based on a literature review method originally used in evidence-based medicine called systematic literature review (SLR), which identifies, filters, classifies and summarizes the findings.

Findings

Starting from the bibliometric results that clearly show an increasing interest in the topic of ubicomp security worldwide, the findings reveal specific types of attacks and vulnerabilities that have motivated the research over the past decade. This review describes most commonly proposed countermeasures – context-aware access control and authentication mechanisms, cryptographic protocols that account for device’s resource constraints, privacy-preserving mechanisms, and trust mechanisms for wireless ad hoc and sensor networks.

Originality/value

To the best of our knowledge, this is the first SLR on security challenges in ubicomp. The findings should serve as a reference to an extensive list of scientific contributions, as well as a guiding point for the researchers’ novel to the security research in ubicomp.

Details

International Journal of Pervasive Computing and Communications, vol. 12 no. 2
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 17 July 2019

Yang Li, Hefu Liu, Matthew Lee and Qian Huang

Previous studies have attempted to address online uncertainties from the relationship marketing perspective. The purpose of this paper is to argue that the integration of media…

1847

Abstract

Purpose

Previous studies have attempted to address online uncertainties from the relationship marketing perspective. The purpose of this paper is to argue that the integration of media richness theory (MRT) and cognitive fit theory (CFT) can contribute a new perspective in addressing consumers’ transaction-specific uncertainties in online retailing.

Design/methodology/approach

On the basis of MRT and CFT, a research model was developed by correlating online channel media richness (OCMR), online–offline information integration (OOII), information privacy concern, perceived deception and online loyalty. The model was empirically examined based on survey data collected from 258 multi-channel consumers in China.

Findings

An analysis of structural equation model showed that OCMR is negatively associated with information privacy concern and perceived deception but is not significant to online loyalty. Information privacy concern has a negative influence on online loyalty, but the effect of perceived deception is not significant. Moreover, information privacy concern is positively related to perceived deception. The OOII strengthens the influence of OCMR but not the moderating effect of integrated promotion, product and price information on the relationship between OCMR and online loyalty.

Originality/value

This study contributes to the extant literature on online retailing by examining the effect of OCMR on online transaction uncertainties. Information integrity in the form of OOII was proposed to complement OCMR. Results have shown that OCMR is significant in reducing online uncertainties, and OOII strengthens this effect, thereby enhancing online loyalty.

Article
Publication date: 26 November 2019

Le Wang, Hai-Hua Hu, Jie Yan and Maggie Qiuzhu Mei

The purpose of this paper is to explore the antecedents of self-disclosure intention on mobile social applications. This study integrates privacy calculus model and elaboration…

1428

Abstract

Purpose

The purpose of this paper is to explore the antecedents of self-disclosure intention on mobile social applications. This study integrates privacy calculus model and elaboration likelihood theory to reconcile the rational and heuristic views of privacy decision making.

Design/methodology/approach

Using a “random dialing” sampling method, an empirical survey with 913 respondents was conducted. A series of regression models were employed to test the proposed relationships. Robust checks with sub-group analysis were conducted.

Findings

Self-disclosure intention develops along a dual route including the central route and the peripheral route. When the central route predominates, social media users form their attitudes toward self-disclosure based on a rational calculus of the privacy concern and perceived rewards. When the peripheral route predominates, users perform a more heuristic evaluation of relevant informational cues (information about privacy harms, the extent of information asymmetry between users and operators) and contextual cues (flow experience, privacy disclosure of friends). Peripheral cues moderate the relationships between central cues and self-disclosure intention.

Originality/value

This paper extends the Elaboration Likelihood Model by investigating the interaction between the central route and peripheral route. The results provide alternative explanations on the renowned “privacy paradox” phenomenon.

Details

Journal of Enterprise Information Management, vol. 33 no. 2
Type: Research Article
ISSN: 1741-0398

Keywords

1 – 6 of 6