Search results

1 – 7 of 7
Article
Publication date: 6 March 2023

Lu An, Yan Shen, Gang Li and Chuanming Yu

Multiple topics often exist on social media platforms that compete for users' attention. To explore how users’ attention transfers in the context of multitopic competition can…

Abstract

Purpose

Multiple topics often exist on social media platforms that compete for users' attention. To explore how users’ attention transfers in the context of multitopic competition can help us understand the development pattern of the public attention.

Design/methodology/approach

This study proposes the prediction model for the attention transfer behavior of social media users in the context of multitopic competition and reveals the important influencing factors of users' attention transfer. Microblogging features are selected from the dimensions of users, time, topics and competitiveness. The microblogging posts on eight topic categories from Sina Weibo, the most popular microblogging platform in China, are used for empirical analysis. A novel indicator named transfer tendency of a feature value is proposed to identify the important factors for attention transfer.

Findings

The accuracy of the prediction model based on Light GBM reaches 91%. It is found that user features are the most important for the attention transfer of microblogging users among all the features. The conditions of attention transfer in all aspects are also revealed.

Originality/value

The findings can help governments and enterprises understand the competition mechanism among multiple topics and improve their ability to cope with public opinions in the complex environment.

Details

Aslib Journal of Information Management, vol. 76 no. 3
Type: Research Article
ISSN: 2050-3806

Keywords

Book part
Publication date: 3 May 2017

Maria Ester de Freitas

The objective of this chapter is to outline an integrating picture of the situation, representativeness, contradictions, and challenges that the treatment of diversity assumes in…

Abstract

The objective of this chapter is to outline an integrating picture of the situation, representativeness, contradictions, and challenges that the treatment of diversity assumes in Brazilian society and in its organizations. The aim is to reply to the research question: “How are public policies and organizational practices constructing ways of inserting and valuing the diversity of Brazilians?” We provide a brief background of the changes in the global and Brazilian contexts over the last few decades and analyze the demographic data presented in the 2010 Census and in studies on diversity that were published in the main periodicals in the Administration area in Brazil, between 2000 and 2014 with regard to the segments most widely studied in the academic literature: Afro-descendants, homosexuals, the elderly, Indians, women, and people with a disability. The conclusion reached is that, in a short period of time, Brazil has made great strides in constructing the mechanisms and legal devices for recognizing the rights of its diverse population and that private companies are in the initial stages of introducing diversity programs.

Article
Publication date: 20 August 2019

Sandhya N., Philip Samuel and Mariamma Chacko

Telecommunication has a decisive role in the development of technology in the current era. The number of mobile users with multiple SIM cards is increasing every second. Hence…

Abstract

Purpose

Telecommunication has a decisive role in the development of technology in the current era. The number of mobile users with multiple SIM cards is increasing every second. Hence, telecommunication is a significant area in which big data technologies are needed. Competition among the telecommunication companies is high due to customer churn. Customer retention in telecom companies is one of the major problems. The paper aims to discuss this issue.

Design/methodology/approach

The authors recommend an Intersection-Randomized Algorithm (IRA) using MapReduce functions to avoid data duplication in the mobile user call data of telecommunication service providers. The authors use the agent-based model (ABM) to predict the complex mobile user behaviour to prevent customer churn with a particular telecommunication service provider.

Findings

The agent-based model increases the prediction accuracy due to the dynamic nature of agents. ABM suggests rules based on mobile user variable features using multiple agents.

Research limitations/implications

The authors have not considered the microscopic behaviour of the customer churn based on complex user behaviour.

Practical implications

This paper shows the effectiveness of the IRA along with the agent-based model to predict the mobile user churn behaviour. The advantage of this proposed model is as follows: the user churn prediction system is straightforward, cost-effective, flexible and distributed with good business profit.

Originality/value

This paper shows the customer churn prediction of complex human behaviour in an effective and flexible manner in a distributed environment using Intersection-Randomized MapReduce Algorithm using agent-based model.

Details

Data Technologies and Applications, vol. 53 no. 3
Type: Research Article
ISSN: 2514-9288

Keywords

Article
Publication date: 31 August 2023

Alaa Mashan Ubaid and Fikri T. Dweiri

This research paper aims to develop and validate an enhanced business process improvement methodology (EBPIM) by integrating the DMAIC (define, measure, analyze, improve and…

Abstract

Purpose

This research paper aims to develop and validate an enhanced business process improvement methodology (EBPIM) by integrating the DMAIC (define, measure, analyze, improve and control) and the comprehensive business process management (CBPM) methodologies.

Design/methodology/approach

A systematic literature review and analysis were conducted to prove the novelty of the research approach and identify the similarities, differences, strengths and weaknesses of the DMAIC and the CBPM methodologies. The EBPIM was proposed based on the analysis results. Then, a focus group approach was used to evaluate and validate the methodology.

Findings

The EBPIM consists of nine activities: preparation, selection, description, quantification, modeling, enactment, improvement opportunities selection, analysis and improvement and monitoring. The proposed methodology adopted the systematic and structured process of the DMAIC methodology by having one tollgate between every two activities to check the progress and authorize the team to go to the next activity. At the same time, it has the ability of the CBPM methodology to enhance the interaction between human activities and business process management systems (BPMS).

Research limitations/implications

The EBPIM was evaluated and validated by a focus group of academic professors. However, the main limitation of the proposed methodology is that it is still theoretical and needs to be empirically tested. Therefore, future work will focus on testing the EBPIM in different industries and organization sizes.

Practical implications

From the theoretical perspective, the proposed methodology adds value to the knowledge in the scope of business processes improvement methodologies (BPIMs) by integrating the DMAIC and the CBPM methodologies. It takes advantage of and combines the strengths of the DMAIC and CBPM methodologies. From the practical perspective, the proposed methodology presents a valuable tool that can facilitate the organization’s mission to improve the areas that need improvement using a systematic improvement methodology that will effectively enhance organizational performance (OP).

Originality/value

The BPIMs literature analysis proved that most of the reviewed methodologies could not support all phases of the business process improvement (BPI) activities. It was concluded that integrating the DMAIC and the CBPM methodologies is a novel approach. The proposed methodology will enhance the efficiency of both methodologies, fill the gaps that may exist in both of them and lead to better results in terms of BPI.

Details

International Journal of Lean Six Sigma, vol. 15 no. 2
Type: Research Article
ISSN: 2040-4166

Keywords

Article
Publication date: 3 May 2016

Mohammad Fathian, Yaser Hoseinpoor and Behrouz Minaei-Bidgoli

Churn management is a fundamental process in firms to keep their customers. Therefore, predicting the customer’s churn is essential to facilitate such processes. The literature…

1009

Abstract

Purpose

Churn management is a fundamental process in firms to keep their customers. Therefore, predicting the customer’s churn is essential to facilitate such processes. The literature has introduced data mining approaches for this purpose. On the other hand, results indicate that performance of classification models increases by combining two or more techniques. The purpose of this paper is to propose a combined model based on clustering and ensemble classifiers.

Design/methodology/approach

Based on churn data set in Cell2Cell, single baseline classifiers, ensemble classifiers are used for comparisons. Specifically, self-organizing map (SOM) clustering technique, and four other classifier techniques including decision tree, artificial neural networks, support vector machine, and K-nearest neighbors were used. Moreover, for reduced dimensions of the features, principal component analysis (PCA) method was employed.

Findings

As results 14 models are compared with each other regarding accuracy, sensitivity, specification, F-measure, and AUC. The results showed that combination of SOM, PCA, and heterogeneous boosting achieved the best performance comparing with other classification models.

Originality/value

This study examined the performance of classifier ensembles in predicting customers churn. In particular, heterogeneous classifier ensembles such as bagging and boosting are compared.

Details

Kybernetes, vol. 45 no. 5
Type: Research Article
ISSN: 0368-492X

Keywords

Article
Publication date: 7 November 2022

Pramukh Nanjundaswamy Vasist and Satish Krishnan

This study aims to establish a comprehensive understanding of the intricacies of how individuals engage with deepfakes, focusing on limiting adverse effects and capitalizing on…

1128

Abstract

Purpose

This study aims to establish a comprehensive understanding of the intricacies of how individuals engage with deepfakes, focusing on limiting adverse effects and capitalizing on their benefits.

Design/methodology/approach

This study conducted a meta-synthesis of qualitative studies on deepfakes, incorporating study-specific analysis followed by a cross-study synthesis.

Findings

Based on the meta-synthesis, the study developed an integrated conceptual framework based on the perspectives from the social shaping of technology theory embedding deepfake-related assertions, motivations, the subtleties of digital platforms, and deepfake-related repercussions.

Research limitations/implications

The study offers crucial insights into the evolving nature of deepfakes as a socio-technical phenomenon and the significance of platform dynamics in deepfake production. It enables researchers to comprehend the cascading effects of deepfakes and positions them to evaluate deepfake-related risks and associated mitigation mechanisms.

Practical implications

The framework that emerges from the study illustrates the influence of platforms on the evolution of deepfakes and assists platform stakeholders in introducing effective platform governance structures to combat the relentless proliferation of deepfakes and their consequences, as well as providing guidance for governments and policymakers to collaborate with platform leaders to set guardrails for deepfake engagement.

Originality/value

Deepfakes have been extensively contested for both their beneficial and negative applications and have been accused of heralding an imminent epistemic threat that has been downplayed by some quarters. This diversity of viewpoints necessitates a comprehensive understanding of the phenomenon. In responding to this call, this is one of the first to establish a comprehensive, theoretically informed perspective on how individuals produce, process, and engage with deepfakes through a meta-synthesis of qualitative literature on deepfakes.

Details

Internet Research, vol. 33 no. 5
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 7 February 2022

Małgorzata Zakrzewska, Szymon Jarosz, Katarzyna Piwowar-Sulej and Mariusz Sołtysik

The aim of the article is to define the way of understanding of agile in enterprises, to verify the factors limiting agility implementation, as well as to understand what the…

1160

Abstract

Purpose

The aim of the article is to define the way of understanding of agile in enterprises, to verify the factors limiting agility implementation, as well as to understand what the expectations of enterprise management towards agile implementation are.

Design/methodology/approach

The article uses both literature studies and empirical research. The research was conducted in 2019 in 152 companies located in Luxemburg, Croatia and Poland, which have implemented an agile approach to management.

Findings

In most of the surveyed organisations, agile is understood as a methodology for creating projects or applications. The most common barriers to implementing agile in the surveyed enterprises are culture too deeply rooted in traditional methodologies and the lack of funds to introduce transformations. Growth in productivity and competitiveness and reducing delivery time stand out among the most common expectations of the management of the surveyed enterprises.

Originality/value

The article is in line with the idea of analysing the key factors of a successful agile implementation, which can be a guideline for an enterprise to manage the adoption of agility. The article utilises original research tools, provides comparisons between countries and presents implications for practitioners and researchers.

Details

Journal of Organizational Change Management, vol. 35 no. 3
Type: Research Article
ISSN: 0953-4814

Keywords

1 – 7 of 7