Search results

1 – 10 of over 68000
Book part
Publication date: 28 April 2021

Liisa Välikangas and Sirkka L. Jarvenpaa

There is a dearth of research addressing network failures, and in particular failures of large-scale organizational networks that pursue radical innovation or grand challenges…

Abstract

There is a dearth of research addressing network failures, and in particular failures of large-scale organizational networks that pursue radical innovation or grand challenges through collaboration. Yet these failures manifestly exist with potential learnings for network participants. In this chapter, the authors consider three major network failures that have been identified in prior research and in the ongoing empirical work. The authors term the failures stalling – not getting started in collaborative work, strategizing – using the network opportunistically to serve other goals than what the network was formed for, and siloing – the network falling short of its collective capacity to learn and innovate due to its lack of connectivity and communication. After describing these three seminal failures in networks of independent organizations, the authors consider the implications for high ambition network collaboration – whether radical innovation or a grand challenge. The authors ask: what do these failures suggest in terms of network participation that would help contribute to network realizing its objective? How should the individual participants of these large-scale organizational networks mitigate failure and maintain the founding ambition, and the performance of the network? What available models for learning are there for the network participants?

Details

Work Life After Failure?: How Employees Bounce Back, Learn, and Recover from Work-Related Setbacks
Type: Book
ISBN: 978-1-83867-519-6

Keywords

Article
Publication date: 9 March 2023

Hang Yin, Jishan Hou, Chengju Gong and Chen Xu

The behavior of the entities in a small and medium-sized enterprise (SME) cooperation network is influenced by the core enterprise. Addressing the problem of how the network

Abstract

Purpose

The behavior of the entities in a small and medium-sized enterprise (SME) cooperation network is influenced by the core enterprise. Addressing the problem of how the network vulnerability changes when the core enterprise is attacked is a challenging topic. The purpose of this paper is to reveal the failure process of SME cooperation networks caused by the failure of the core SME from the perspective of cascading failure.

Design/methodology/approach

According to the Torch High Technology Industry Development Center, Ministry of Science & Technology in China, 296 SMEs in Jiangsu province were used to construct an SME cooperation network of technology-based SMEs and an under-loading cascading failure model. The weight-based attack strategy was selected to mimic a deliberate node attack and was used to analyze the vulnerability of the SME cooperation network.

Findings

Some important conclusions are obtained from the simulation analysis: (1) The minimum boundary of node enterprises has a negative relationship with networks' invulnerability, while the breakdown probability has an inverted-U relationship with networks' invulnerability. (2) The combined effect of minimum boundary and breakdown probability indicates that the vulnerability of networks is mainly determined by the breakdown probability; while, minimum boundary helps prevent cascading failure occur. Furthermore, according to the case study, adapting capital needs and resilience in the cooperation network is the core problem in improving the robustness of SME cooperation networks.

Originality/value

This research proposed an under-loading cascading failure model to investigate the under-loading failure process caused by the shortage of resources when the core enterprise fails or withdraws from the SME cooperation network. Two key parameters in the proposed model—minimum capacity and breakdown probability—could serve as a guide for research on the vulnerability of SME cooperation networks. Additionally, practical meanings for each parameter in the proposed model are given, to suggest novel insights regarding network protection to facilitate the robustness and vulnerability in real SME cooperation networks.

Article
Publication date: 20 November 2009

Roy Friedman and Galya Tcharny

Mobile ad‐hoc networks (MANET) are networks that are formed in an ad‐hoc manner by collections of devices that are equipped with wireless communication capabilities, such as the…

Abstract

Purpose

Mobile ad‐hoc networks (MANET) are networks that are formed in an ad‐hoc manner by collections of devices that are equipped with wireless communication capabilities, such as the popular WiFi (IEEE 802.11b) standard. As the hardware technology and networking protocols for MANETs become mature and ubiquitous, the main barrier for MANETs to become widely used is applications. Like in other areas of distributed computing, in order to expedite the development of applications, there is a need for middleware services that support these applications. Failure detection has been identified as a basic component for many reliable distributed middleware services and applications. This paper aims to investigate this issue.

Design/methodology/approach

This paper presents an adaptation of a gossip‐based failure detection protocol to MANETs, and an evaluation by extensive simulations of this protocol's performance in such networks.

Findings

The results can be viewed as a feasibility check for implementing failure detection in MANETs, and the conclusions drawn from them can be used to motivate and improve future implementations of both a failure detection component and of applications and middleware services relying on such a component.

Originality/value

This paper presents an adaptation of a gossip‐based failure detection protocol to MANET environments, and presents an extensive simulation‐based performance study of this protocol in MANETs with various parameters.

Details

International Journal of Pervasive Computing and Communications, vol. 5 no. 4
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 7 October 2022

Wan Cheng and Yusi Jiang

Studies on organizational failure learning have focused on whether and how organizations learn from failures but have paid limited attention on the persistence of failure

Abstract

Purpose

Studies on organizational failure learning have focused on whether and how organizations learn from failures but have paid limited attention on the persistence of failure learning. This study centers on failure recidivism and answers why organizations would fall into repeated failures after learning from them.

Design/methodology/approach

Based on a sample of Chinese publicly listed firms that once recovered from special treatment status, the authors use event history technique and Cox proportional hazards regression model.

Findings

The authors find that reviviscent firms with higher interlock centrality are less likely to decline again, and underperforming partners can strengthen the role of interlock tie in failure recidivism. By contrast, politically connected reviviscent firms are more likely to decline again, and this effect attenuates for firms located in more market-oriented regions.

Research limitations/implications

The authors’ contribution comes from the close integration of literature on failure learning and network embeddedness perspective to examine how social networks affect the learning process of failure recidivism.

Practical implications

The study provides important practical implications for organizations, especially those that once experienced failures or are experiencing failures.

Originality/value

Combining organizational learning theory and network embeddedness perspective, the study provides novel insights into answering how firms embedded in different types of social networks affect failure learning persistence differently.

Details

Management Decision, vol. 61 no. 3
Type: Research Article
ISSN: 0025-1747

Keywords

Article
Publication date: 1 December 2021

Pinsheng Duan and Jianliang Zhou

The construction industry is an industry with a high incidence of safety accidents, and the interactions of unsafe behaviors of construction workers are the main cause of…

Abstract

Purpose

The construction industry is an industry with a high incidence of safety accidents, and the interactions of unsafe behaviors of construction workers are the main cause of accidents. The neglect of the interactions may lead to serious underestimation of safety risks. This research aims to analyze the cascading vulnerability of unsafe behaviors of construction workers from the perspective of network modeling.

Design/methodology/approach

An unsafe behavior network of construction workers and a cascading vulnerability analysis model were established based on 296 actual accident cases. The cascading vulnerability of each unsafe behavior was analyzed based on the degree attack strategy.

Findings

Complex network with 85 unsafe behavior nodes is established based on the collected accidents in total. The results showed that storing in improper location, does not wear a safety helmet, working with illness and working after drinking are unsafe behaviors with high cascading vulnerability. Coupling analysis revealed that differentiated management strategies of unsafe behaviors should be applied. Besides, more focus should be put on high cascading vulnerability behaviors.

Originality/value

This research proposed a method to construct the cascading failure model of unsafe behavior for individual construction workers. The key parameters of the cascading failure model of unsafe behaviors of construction workers were determined, which could provide a reference for the research of cascading failure of unsafe behaviors. Additionally, a dynamic vulnerability research framework based on complex network theory was proposed to analyze the cascading vulnerability of unsafe behaviors. The research synthesized the results of dynamic and static analysis and found the key control nodes to systematically control unsafe construction behaviors.

Details

Engineering, Construction and Architectural Management, vol. 30 no. 3
Type: Research Article
ISSN: 0969-9988

Keywords

Open Access
Article
Publication date: 25 February 2020

Annalisa Tunisini and Michela Marchiori

The purpose of this paper is to examine network failures and the main reasons why network organizations, intentionally developed by a group of actors to pursue specific goals…

3127

Abstract

Purpose

The purpose of this paper is to examine network failures and the main reasons why network organizations, intentionally developed by a group of actors to pursue specific goals, become unfruitful and fail in their goals and expectations of creating collective value. The goal of this paper is thus to contribute a better understanding of the reasons network organizations encounter problems in their dynamics that prevent them from reaching the expected outcomes.

Design/methodology/approach

The study is firstly based on a literature review finalized to identify the main variables considered as potentially impacting on network failures. Secondly, the paper is based on a survey conducted on 189 strategic networks that highlighted difficulties in achieving their goals. An analysis of the 24 questionnaires returned generated the results discussed. The empirical study concerns strategic networks intentionally created and signed by Italian SMEs according to a specific law designed to promote the development of inter-firm cooperation (“network contracts”).

Findings

The results of the research highlight the role of specific key items related to individual, structural, legitimacy, interaction and governance variables in explaining failures in network organizations. According to the data, failure can occur immediately before the network start-up, resulting in a blocked network or in a subsequent developmental stage, resulting in a dormant network. The empirical research demonstrated that the items affecting network failure differ between blocked and dormant networks. The authors explain such differences, considering them according to the expected goals declared by the two different types of networks.

Originality/value

The question of why networks fail is relevant in times of disruption and digitalization when new forms of organization are needed to link businesses and various stakeholders and thereby develop innovative and sustainable ideas for an entrepreneurial future. However, very few studies have examined network failure. The study contributes to this field of research by investigating the dynamics of networks intentionally developed to reach shared goals. The findings can be useful to both companies that decide to start up a strategic network and the policymakers that promote, finance and monitor inter-firm collaboration.

Details

Journal of Business & Industrial Marketing, vol. 35 no. 6
Type: Research Article
ISSN: 0885-8624

Keywords

Article
Publication date: 13 October 2021

Zhifang Wang, Jianguo Yu, Shangjing Lin, Junguo Dong and Zheng Yu

The paper takes the air-ground integrated wireless ad hoc network-integrated system as the research object, this paper aims to propose a distributed robust H adaptive…

176

Abstract

Purpose

The paper takes the air-ground integrated wireless ad hoc network-integrated system as the research object, this paper aims to propose a distributed robust H adaptive fault-tolerant control algorithm suitable for the system to distribute to solve the problem of control and communication failure at the same time.

Design/methodology/approach

In the paper, the authors propose a distributed robust H adaptive fault-tolerant control algorithm suitable for the air-ground integrated wireless ad hoc network-integrated system.

Findings

The results show that the integrated system has good robustness and fault tolerance performance indicators for flight control and wireless signal transmission when confronted with external disturbances, internal actuator failures and wireless network associated failures and the flight control curve of the quadrotor unmanned aerial vehicle (UAV) is generally smooth and stable, even if it encounters external disturbances and actuator failures, its fault tolerance performance is very good. Then in the range of 400–800 m wireless communication distance, the success rate of wireless signal loop transmission is stable at 80%–100% and the performance is at least relatively improved by 158.823%.

Originality/value

This paper takes the air-ground integrated wireless ad hoc network-integrated system as the research object, based on the robust fault-tolerant control algorithm, the authors propose a distributed robust H adaptive fault-tolerant control algorithm suitable for the system and through the Riccati equation and linear matrix inequation method, the designed distributed robust H adaptive fault-tolerant controller further optimizes the fault suppression factor γ, so as to break through the limitation of only one Lyapunov matrix for different fault modes to distribute to solve the problem of control and communication failure at the same time.

Article
Publication date: 29 April 2014

Zhiyun Zou, Jinlong Wu, Jianzhi Gao and Xuecai Xu

By aiming at defending cascade failures effectively, the purpose of this paper is to present a strategy of inserting modular topologies into urban road network through reducing…

Abstract

Purpose

By aiming at defending cascade failures effectively, the purpose of this paper is to present a strategy of inserting modular topologies into urban road network through reducing the burdens of critical components with too much traffic flow.

Design/methodology/approach

Each module is considered as a small-world random network, which is inserted into the initial Barabási-Albert scale-free network. Based on the user-equilibrium assignment, the strategy searches for remote nodes with low betweeness and flow in the network, and sets these nodes to be connected with the modular topologies. In this sense, the inserted modules are supposed to attach to the nodes with lower intensity of shorter path, and avoid bringing more impact to the nodes with higher betweeness and traffic flow. By using efficiency as the measurement of cascading failures, the performance of the networks generated through the strategy is tested.

Findings

The results show that the performance of the strategy is sensitive to the average degree of the inserted modular, and the modular size with a better effect on reducing the size of cascading failures or delaying the time of breakdown, while the other factors (e.g. the rewired probability) present few differences among various values. Meanwhile, it is found that the importance-based attachment mechanism has a better effect on preventing the cascading failures, especially delaying the step time of the larger reduction.

Practical implications

The strategy aims at alleviating the burdens in critical components to prevent the cascading failures of the network, and provides practical guidance on the decision of the urban road network evolving process.

Originality/value

An effective strategy for cascade defense in urban road network is proposed in this paper.

Details

Kybernetes, vol. 43 no. 5
Type: Research Article
ISSN: 0368-492X

Keywords

Article
Publication date: 28 October 2020

Francesco Rouhana and Dima Jawad

This paper aims to present a novel approach for assessing the resilience of transportation road infrastructure against different failure scenarios based on the topological…

Abstract

Purpose

This paper aims to present a novel approach for assessing the resilience of transportation road infrastructure against different failure scenarios based on the topological properties of the network. The approach is implemented in the context of developing countries where data scarcity is the norm, taking the capital city of Beirut as a case study.

Design/methodology/approach

The approach is based on the graph theory concepts and uses spatial data and urban network analysis toolbox to estimate the resilience under random and rank-ordering failure scenarios. The quantitative approach is applied to statistically model the topological graph properties, centralities and appropriate resilience metrics.

Findings

The research approach is able to provide a unique insight into the network configuration in terms of resilience against failures. The road network of Beirut, with an average nodal degree of three, turns to act more similarly to a random graph when exposed to failures. Topological parameters, connectivity and density indices of the network decline through disruptions while revealing an entire dependence on the state of nodes. The Beirut random network responds similarly to random and targeted removals. Critical network components are highlighted following the approach.

Research limitations/implications

The approach is limited to an undirected and weighted specific graph of Beirut where the capacity to collect and process the necessary data in such context is limited.

Practical implications

Decision-makers are better able to direct and optimize resources by prioritizing the critical network components, therefore reducing the failure-induced downtime in the functionality.

Originality/value

The resilience of Beirut transportation network is quantified uniquely through graph theory under various node removal modes.

Details

International Journal of Disaster Resilience in the Built Environment, vol. 12 no. 4
Type: Research Article
ISSN: 1759-5908

Keywords

Book part
Publication date: 8 May 2003

Chris Cassir, Michael G H Bell and Jan-Dirk Schmöcker

This paper describes and extends the game theoretic approach to network vulnerability assessment. The basic idea is to set up a game between the network users who are trying to…

Abstract

This paper describes and extends the game theoretic approach to network vulnerability assessment. The basic idea is to set up a game between the network users who are trying to minimise their expected travel time by choice of route and a network tester who is trying to penalise the users most by degrading a link through capacity reduction leading to congestion. The method therefore finds the worst possible location for a link degradation, taking re-routing options into account (an upper, lower bound of impact). The original game identifies the weakest link for routes between an OD pair in the network. Two variations are introduced in this paper in order to determine the weak links for a specific origin or a specific destination and for the whole network. All three game variations are tested on a small network in Leicester and the results are presented.

Details

The Network Reliability of Transport
Type: Book
ISBN: 978-0-08-044109-2

1 – 10 of over 68000