Search results
11 – 20 of over 6000Hannu Verkasalo and Heikki Hämmäinen
The purpose of the article is to demonstrate the viablity of a handset‐based research platform in measuring mobile service and application usage through various descriptive…
Abstract
Purpose
The purpose of the article is to demonstrate the viablity of a handset‐based research platform in measuring mobile service and application usage through various descriptive empirical studies.
Design/methodology/approach
A handset‐based research platform was used in measuring mobile usage in an international panel consisting of more than 500 mobile subscribers. The panel took place in 2005‐2006.
Findings
The research paper finds various interesting data points which cannot be derived with any other method. In addition, the paper finds that there are significant differences in certain mobile service and application use cases between different demographic groups.
Research limitations/implications
The main research limitations are the size of the sample and lack of clear business implications. The main idea of the paper was just to demonstrate the type of measurements and studies that can be done with the developed research platform.
Practical implications
3G technology drives packet data usage and 3rd party application usage in smartphones is very promising. Handset‐based research platform can and should be used in the future in various empirical studies on the mobile telecommunication market
Originality/value
A handset‐based research platform has never before been utilized in doing market research, and therefore the process and results discussed in this paper are pioneering ones.
Details
Keywords
Introduction: Healthcare facilities have witnessed deterioration, limited employee engagement, and communication gaps due to a lack of wireless technology. The Internet makes work…
Abstract
Introduction: Healthcare facilities have witnessed deterioration, limited employee engagement, and communication gaps due to a lack of wireless technology. The Internet makes work and life quicker and more intelligent. The Internet of Things (IoT) is a scheme of interconnection equipped with unique identifiers in recent years. Artificial intelligence (AI) and IoT advancement allow employees to develop competent and predictive services and solutions in human resource (HR) practices. This chapter has been formulated to summarise and classify the existing research and better understand the past, present, and future of employee engagement by improving IoT interrelated devices in the healthcare industry.
Purpose: This study aims to categorise and overcome the challenges involved in HR practices. Effectively embracing IoT application-connected devices in the healthcare industry can enhance human resources management’s (HRM) role and measure performance assessment to improve employee engagement and productivity.
Methodology: In this study, the authors develop propositions dependent on a theory-based review. A systematic analysis was applied to minimise the challenges of HRM. The subject-related articles from different journal sources, like Scopus, Emerald, Web of Science, Springer, etc., were analysed based on engagement criteria. It was graphically recorded in a collective and informative way to emphasise the review outcomes. The study has presented the positive impacts of AI and IoT on engagement in health care.
Summary: This chapter accumulated theory-based knowledge about healthcare employee engagement and how IoT-based technology like AI can optimise employees’ engagement effectively. Further, it draws comparative benefits for a workforce to execute performance advancements and create future progressive aspects for healthcare employees.
Details
Keywords
Rami Puzis, Dana Yagil, Yuval Elovici and Dan Braha
The purpose of this paper is to model and study the effectiveness of an attack on the anonymity of Internet users by a group of collaborating eavesdroppers.
Abstract
Purpose
The purpose of this paper is to model and study the effectiveness of an attack on the anonymity of Internet users by a group of collaborating eavesdroppers.
Design/methodology/approach
The paper is based on an analysis of the Internet topology. The study is based on two methods for choosing nodes that contribute the most to the detection of as many communicating Internet users as possible.
Findings
The paper illustrates that it is possible to compromise the anonymity of many Internet users when eavesdropping on a relatively small number of nodes, even when the most central ones are protected from eavesdropping.
Research limitations/implications
It is assumed that the Internet users under attack are not using any anonymity enhancing technologies, but nodes can be protected from eavesdropping. It proposes a measure of the success of an attack on Internet users' anonymity, for a given deployment of collaborating eavesdroppers in the Internet.
Practical implications
The paper shows that several, and not necessarily the most prominent, collaborating nodes can compromise the anonymity of a considerable portion of Internet users. This study also emphasizes that when trying to completely compromise the anonymity of Internet users, an eavesdroppers' deployment strategy that considers eavesdroppers' collaboration can result in substantial resource saving compared to choosing a set of the most prominent nodes.
Originality/value
The paper proposes a new measure of anonymity level in the network, based on the linkability of the Internet users. This paper is the first to present results of a non‐trivial Group Betweenness optimization strategy in large complex networks.
Details
Keywords
Alon Hasgall and Snunith Shoham
In a competitive business environment, organizations must leverage their resources efficiently in order to provide system‐wide solutions and maintain the standards all customers…
Abstract
Purpose
In a competitive business environment, organizations must leverage their resources efficiently in order to provide system‐wide solutions and maintain the standards all customers expect. To do so, the resources must be integrated; however, the integration of information and resources within organizations has thus far not produced satisfactory results. In contrast, it has been found that efficient, ongoing and timely transfer of information is conducted over the internet. This research seeks to examine whether the use of internet technology within organizations can indeed enhance and streamline the ability of employees to function as fractals in complex organizations.
Design/methodology/approach
The research is a qualitative study, allowing for the examination of behavior in the organizational reality as is, by analyzing interviews and observations of over 60 employees in different organizations.
Findings
It is found that the ability of a digital social network to create immediate system‐wide solutions, together with a management approach that transforms the organization into a complex adaptive system, allows employees to behave as fractals – i.e. to share applied‐knowledge, to take responsibility for performance and management of the processes, to update their superiors, and to develop self‐management abilities at the local level.
Originality/value
Social networks in organizations should be viewed as a shared “knowledge” system. Use of the network is “natural” and less rational and synchronized up front. However, it must be backed by a relevant management culture that enables all employees to serve as fractals in a complex adaptive system. In this manner, employees can contribute personally to work processes, determine their needs, and receive credit.
Details
Keywords
Abul Khayer, Nusrat Jahan, Md. Nahin Hossain and Md. Yahin Hossain
The purpose of this paper is to examine the determinants of cloud computing adoption in small and medium enterprises (SMEs), further, to measure the effect of cloud computing…
Abstract
Purpose
The purpose of this paper is to examine the determinants of cloud computing adoption in small and medium enterprises (SMEs), further, to measure the effect of cloud computing adoption on cloud-supported firm performance through enhancing organisational agility.
Design/methodology/approach
The research model is developed by combining two popular theoretical models, namely, the unified theory of acceptance and use of technology (UTAUT) and the technology–organisation–environment (TOE) framework. Data are collected from 372 SMEs to test the model. The strengths of widely used structural equation modelling (SEM) are applied to analyse the data.
Findings
This study reveals that the significant predictors of cloud computing adoption are performance expectancy; effort expectancy; absorptive capacity; data security and privacy; and perceived trust. Also, cloud computing adoption positively influences firm performance directly and through organisational agility. The results of importance–performance map analysis indicate that effort expectancy falls in the critical zone, which needs to be improved.
Originality/value
This research is one of few that blends the strengths of UTAUT and TOE framework. The research outcomes yield noteworthy suggestions to cloud providers, managers and government policymakers on ways of motivating the spread of cloud computing in developing countries.
Details
Keywords
Peizhen Jin, Hongyi Wu, Desheng Yin and Yupeng Zhang
Based on the perspective of technology supply chain, this study explores the effect of macroeconomic uncertainty regarding the spatiotemporal evolution of urban innovation…
Abstract
Purpose
Based on the perspective of technology supply chain, this study explores the effect of macroeconomic uncertainty regarding the spatiotemporal evolution of urban innovation networks to establish causality.
Design/methodology/approach
It collects patent trading data for 283 cities in China (2005–2017) and employs the spatial econometric model to investigate the causal relationship.
Findings
The regional transfer of advanced technology in China is rising sharply, and the innovation network based on patent trading is typically high-density, multi-direction and wide-spreading. Further, macroeconomic uncertainty has a negative effect on the scale of innovation flows and the absorptive capacity in eastern cities. However, it has no significant impact on the innovation network characteristics in developed cities. In contrast, macroeconomic uncertainty is detrimental for the absorptive capacity and node importance in inland and undeveloped cities.
Practical implications
As macroeconomic uncertainty increases, it is important to improve the quality of the urban innovation network with a better understanding of heterogeneity to promote further suitability innovation at the region-level.
Originality/value
This study highlights a clear and distinctive view that macroeconomic uncertainty not only directly affects the evolution of the urban innovation network but also indirectly affects the characteristics of other city nodes via the spatial spillover mechanism.
Details
Keywords
Donal Heffernan and Paula Doyle
In industrial distributed control environments for automation technology, Ethernet network based solutions are gaining prominence in the traditional fieldbus application areas…
Abstract
In industrial distributed control environments for automation technology, Ethernet network based solutions are gaining prominence in the traditional fieldbus application areas with the promise of standardised solutions that can support real‐time operation to a resolution of less than 1 μm. However, there are no formal standards for a real‐time Industrial Ethernet. This paper looks at some of the emerging de facto solutions and describes a novel project where clusters of real‐time transducer networks are developed and the control is tightly synchronised using the IEEE 1588 clock synchronisation standard, realising a “Time‐triggered Ethernet” solution.
Details
Keywords
Junyi Chen, Buqing Cao, Zhenlian Peng, Ziming Xie, Shanpeng Liu and Qian Peng
With the increasing number of mobile applications, efficiently recommending mobile applications to users has become a challenging problem. Although existing mobile application…
Abstract
Purpose
With the increasing number of mobile applications, efficiently recommending mobile applications to users has become a challenging problem. Although existing mobile application recommendation approaches based on user attributes and behaviors have achieved notable effectiveness, they overlook the diffusion patterns and interdependencies of topic-specific mobile applications among user groups. mobile applications among user groups. This paper aims to capture the diffusion patterns and interdependencies of mobile applications among user groups. To achieve this, a topic-aware neural network-based mobile application recommendation method, referred to as TN-MR, is proposed.
Design/methodology/approach
In this method, first, the user representations are enhanced by introducing a topic-aware attention layer, which captures both the topic context and the diffusion history context. Second, it exploits a time-decay mechanism to simulate changes in user interest. Multitopic user representations are aggregated by the time decay module to output the user representations of cascading representations under multiple topics. Finally, user scores that are likely to download the mobile application are predicted and ranked.
Findings
Experimental comparisons and analyses were conducted on the actual 360App data set, and the results demonstrate that the effectiveness of mobile application recommendations can be significantly improved by using TN-MR.
Originality/value
In this paper, the authors propose a mobile application recommendation method based on topic-aware attention networks. By capturing the diffusion patterns and dependencies of mobile applications, it effectively assists users in selecting their applications of interest from thousands of options, significantly improving the accuracy of mobile application recommendations.
Details
Keywords
The purpose of this paper is to identify the factors that generate public value in e-government services through emerging technologies and to answer the following question: Which…
Abstract
Purpose
The purpose of this paper is to identify the factors that generate public value in e-government services through emerging technologies and to answer the following question: Which are the factors that generate public value, in the e-government services, through emerging technologies?
Design/methodology/approach
Based on a multivariate linear regression model, the author tests the public value of e-government services through emerging technologies in the metropolitan area of the Toluca Valley. Five factors are evaluated to understand public value: anti-corruption strategies, access to public information, transparency platforms, social media and service kiosks.
Findings
Smart strategies and technologies must be guided by the generation of public value through anti-corruption strategies, open data, access to information and data privacy. The efforts of governments should focus on avoiding corruption, making government transparent, opening data and correct handling of information privacy. Technology is an important mechanism to boost public value generation.
Research limitations/implications
Mexico is a developing country, and there are very few emerging technologies implemented in e-Government.
Practical implications
The results are important to identify good practices for the generation of public value in the e-Government area.
Originality/value
The study of emerging technologies is a new area in government, and this paper studies the generation of public value through emerging technologies in a developing country.
Details
Keywords
Matthew Jervis and Masood Masoodian
– This article aims to describe how people manage to integrate their use of paper and electronic documents in modern office work environments.
Abstract
Purpose
This article aims to describe how people manage to integrate their use of paper and electronic documents in modern office work environments.
Design/methodology/approach
An observational interview type study of 14 participants from 11 offices in eight organizations was conducted. Recorded data were analysed using a thematic analysis method. This involved reading and annotation of interview transcripts, categorizing, linking and connecting, corroborating, and producing an account of the study.
Findings
The findings of the study can be categorized into four groups: the roles paper and electronic documents serve in today's offices, the ways in which these documents are managed, the problems associated with their management, and the types of fragmentation that exist in terms of their management and how these are dealt with.
Practical implications
The study has identified the need for better integrated management of paper and electronic documents in present-day offices. The findings of the study have then been used to propose a set of guidelines for the development of integrated paper and electronic document management systems.
Originality/value
Although similar studies of offices have been conducted in the past, almost all of these studies are prior to the widespread use of mobile and network-based shared technologies in office environments. Furthermore, previous studies have generally failed to identify and propose guidelines for integration of paper and electronic document management systems.
Details