Search results

1 – 3 of 3
Article
Publication date: 25 April 2024

Michael Dreyfuss and Gavriel David Pinto

Every business company deals with the dilemma of how much to invest in long-term (LT) versus short-term (ST) problem (LTvST problem). LT operations increase the reputation of the…

Abstract

Purpose

Every business company deals with the dilemma of how much to invest in long-term (LT) versus short-term (ST) problem (LTvST problem). LT operations increase the reputation of the company, and revenue is rewarded in the future. In contrast, ST operations result in immediate rewards. Thus, every organization faces the dilemma of how much to invest in LT versus ST activities. The former deals with the “what” or effectiveness, and the latter deals with the “how” or efficiency. The role of managers is to solve this dilemma; however, they often fail to do so, mainly because of a lack of knowledge. This study aims to propose a dynamic optimal control model that formulates and solves the LTvST problem.

Design/methodology/approach

This study proposes a dynamic optimal control model that formulates and solves the dilemma whether to invest in short- or LT operations.

Findings

This model is illustrated as an example of an academic institute that wants to maximize its reputation. Investing in effectiveness in the academy translates into investing in research, whereas investing in efficiency translates into investing in teaching. Universities and colleges with a good reputation attract stronger candidates and benefit from higher tuition fees. Steady-state conditions and insightful observations were obtained by studying the optimal solution and performing a sensitivity analysis.

Originality/value

To the best of the authors’ knowledge, this paper is the first one to explore the optimal strategy when trying to maximize the short and LT activities of a company and solve the LTvST problem. Furthermore, it is applied on universities where teaching is the ST activity and research the LT activity. The insights gleaned from the application are relevant to many different fields. The authors believe that the paper makes a significant contribution to academic literature and to business managers.

Details

Journal of Modelling in Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1746-5664

Keywords

Article
Publication date: 30 April 2024

Iwan Vanany, Jan Mei Soon-Sinclair and Nur Aini Rahkmawati

The demand for halal food products is increasing globally. However, fraudulent activities in halal products and certification are also rising. One strategy to ensure halal…

Abstract

Purpose

The demand for halal food products is increasing globally. However, fraudulent activities in halal products and certification are also rising. One strategy to ensure halal integrity in the food supply chain is applying halal blockchain technology. However, to date, a few studies have assessed the factors and variables that facilitate or hinder the adoption of this technology. Thus, this study aims to assess the significant factors and variables affecting the adoption of halal blockchain technology.

Design/methodology/approach

A Delphi-based approach, using semi-structured interviews, was conducted with three food companies (chicken slaughterhouses, milk processing plants and frozen food companies). The cognitive best–worst method determines the significant factors and variables to prioritise halal blockchain adoption decisions.

Findings

The results showed that the most significant factors were coercive pressure and halal strategy. Nineteen variables were identified to establish a valid hierarchical structure for halal blockchain adoption in the Indonesian food industry. The five significant variables assessed through the best–worst method were demand, regulator, supply side, sustainability of the company’s existence and main customers.

Practical implications

The proposed halal blockchain decision structure can assist food companies in deciding whether to adopt the technology.

Originality/value

This study proposes 19 variables that establish a valid hierarchical structure of halal blockchain adoption for the Indonesian food industry.

Details

Journal of Islamic Marketing, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1759-0833

Keywords

Article
Publication date: 30 April 2024

C. Bharanidharan, S. Malathi and Hariprasath Manoharan

The potential of vehicle ad hoc networks (VANETs) to improve driver and passenger safety and security has made them a hot topic in the field of intelligent transportation systems…

Abstract

Purpose

The potential of vehicle ad hoc networks (VANETs) to improve driver and passenger safety and security has made them a hot topic in the field of intelligent transportation systems (ITSs). VANETs have different characteristics and system architectures from mobile ad hoc networks (MANETs), with a primary focus on vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communication. But protecting VANETs from malicious assaults is crucial because they can undermine network security and safety.

Design/methodology/approach

The black hole attack is a well-known danger to VANETs. It occurs when a hostile node introduces phony routing tables into the network, potentially damaging it and interfering with communication. A safe ad hoc on-demand distance vector (AODV) routing protocol has been created in response to this issue. By adding cryptographic features for source and target node verification to the route request (RREQ) and route reply (RREP) packets, this protocol improves upon the original AODV routing system.

Findings

Through the use of cryptographic-based encryption and decryption techniques, the suggested method fortifies the VANET connection. In addition, other network metrics are taken into account to assess the effectiveness of the secure AODV routing protocol under black hole attacks, including packet loss, end-to-end latency, packet delivery ratio (PDR) and routing request overhead. Results from simulations using an NS-2.33 simulator show how well the suggested fix works to enhance system performance and lessen the effects of black hole assaults on VANETs.

Originality/value

All things considered, the safe AODV routing protocol provides a strong method for improving security and dependability in VANET systems, protecting against malevolent attacks and guaranteeing smooth communication between cars and infrastructure.

Details

International Journal of Intelligent Unmanned Systems, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2049-6427

Keywords

Access

Year

Last week (3)

Content type

Earlycite article (3)
1 – 3 of 3