Search results

1 – 10 of 377
Open Access
Article
Publication date: 14 February 2022

Mohammad Fraiwan

Social networks (SNs) have recently evolved from a means of connecting people to becoming a tool for social engineering, radicalization, dissemination of propaganda and…

1497

Abstract

Purpose

Social networks (SNs) have recently evolved from a means of connecting people to becoming a tool for social engineering, radicalization, dissemination of propaganda and recruitment of terrorists. It is no secret that the majority of the Islamic State in Iraq and Syria (ISIS) members are Arabic speakers, and even the non-Arabs adopt Arabic nicknames. However, the majority of the literature researching the subject deals with non-Arabic languages. Moreover, the features involved in identifying radical Islamic content are shallow and the search or classification terms are common in daily chatter among people of the region. The authors aim at distinguishing normal conversation, influenced by the role religion plays in daily life, from terror-related content.

Design/methodology/approach

This article presents the authors' experience and the results of collecting, analyzing and classifying Twitter data from affiliated members of ISIS, as well as sympathizers. The authors used artificial intelligence (AI) and machine learning classification algorithms to categorize the tweets, as terror-related, generic religious, and unrelated.

Findings

The authors report the classification accuracy of the K-nearest neighbor (KNN), Bernoulli Naive Bayes (BNN) and support vector machine (SVM) [one-against-all (OAA) and all-against-all (AAA)] algorithms. The authors achieved a high classification F1 score of 83\%. The work in this paper will hopefully aid more accurate classification of radical content.

Originality/value

In this paper, the authors have collected and analyzed thousands of tweets advocating and promoting ISIS. The authors have identified many common markers and keywords characteristic of ISIS rhetoric. Moreover, the authors have applied text processing and AI machine learning techniques to classify the tweets into one of three categories: terror-related, non-terror political chatter and news and unrelated data-polluting tweets.

Details

Applied Computing and Informatics, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2634-1964

Keywords

Article
Publication date: 17 February 2023

Piriya Pholphirul, Akkaranai Kwanyou, Pungpond Rukumnuaykit, Teerawat Charoenrat and Kitisak Srijamdee

This study aims to analyze social networking and network centrality in the case of community enterprises, which the existing literature has not addressed. To do so, the authors…

Abstract

Purpose

This study aims to analyze social networking and network centrality in the case of community enterprises, which the existing literature has not addressed. To do so, the authors use the survey of community enterprises from the One Tambon One Product (OTOP) entrepreneurship program of Nong Khai border province in Thailand as a case study.

Design/methodology/approach

Social network analysis (SNA) is a tool to study and understand the relationship patterns of units of analysis, which can be individual, household, community or production units, and how those units interact through social or economic activities. Network positions are important when identifying the centralization of links in a particular network. If a representative is close to the center of a network, it is possible that the production unit will be able to contact or coordinate with a greater number of other members of the cluster, create knowledge sharing, promote collaboration and then typically demonstrate greater performance.

Findings

The results show that overall, local government agencies play a critical role in the community enterprise relationship network, while private entities are the least active group. Enterprises in partnerships with external agencies are mostly cooperating with branding and marketing dimensions, followed by the design dimension. There is no cooperation regarding production and distribution. Most community enterprises have established at least a one-dimensional network of cooperation with external agencies; only five community enterprises have isolated nodes with no partnerships having been created within this group.

Research limitations/implications

The study was limited by the surveys having been conducted in a single area and, therefore, can be used only as a case study for this area. Surveys in larger group sizes and in a wider range of areas would lead to results with greater applicability and reliability.

Practical implications

These results bring to mind policy proposals to increase the competitiveness of community enterprises through the development of social networks as follows: firstly, knowledge should be created with community enterprise operators to understand their supply chains and analyze the strengths and weaknesses and core competencies of their enterprises; and secondly, enterprises should be educated about which agencies can assist businesses at each stage in the value chain system and encouraged to ask for help in adding value at each stage of production.

Social implications

A “OTOP to Business Networking” platform for community and private enterprises should be created with projects/activities that offer venues to exchange business learning and opportunities. Holding meetings among people in a variety of business sectors may help inspire entrepreneurs to innovate to further their businesses, which can lead to networking businesses conducting activities across community enterprises and the private sector for the mutual benefit of producing merchandise for large customers and markets. Learning systems, production techniques and cooperation should be created, as well as opportunities to increase market share and profitability, if this platform is successful.

Originality/value

This paper is the first study, to the best of the authors’ knowledge, to utilize SNA to examine the use of social networking among community enterprises participating in Thailand’s OTOP entrepreneurship program in Nong Khai province. The results show that overall, local government agencies play a critical role in the community enterprise relationship network, while private entities are the least active group. Therefore, the government can play an important role in helping to develop a network of community enterprises with external entities at each stage of the value chain to enhance the competitiveness of each enterprise.

Details

Journal of Entrepreneurship in Emerging Economies, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2053-4604

Keywords

Article
Publication date: 15 February 2024

Michael K. Dzordzormenyoh

This study investigates the factors that influence citizens trust in public leaders [i.e. presidents, members of parliament (MPs) and local government leaders (LGs)] in 34…

Abstract

Purpose

This study investigates the factors that influence citizens trust in public leaders [i.e. presidents, members of parliament (MPs) and local government leaders (LGs)] in 34 countries in Africa between 2019 and 2021.

Design/methodology/approach

Individual-level data with a sample size of 48,084 was obtained from the Afro-Barometer round 8 survey only and analyzed using multivariate binary logistic regression.

Findings

Several important and intriguing observations were made from this analysis: (1) the performance of public leaders influences citizens trust in their leaders; (2) the perceived corruption of public leaders and civil servants and the level of corruption influence citizens trust in public leaders; (3) perceived neighborhood problems (i.e. fear of violence, fear of terrorism and service delivery) influence citizens trust in their public leaders and (4) the socio-demographic characteristics of citizens (i.e. age, religion, education, location, employment and political party affiliation) influence citizens trust in their public leaders.

Originality/value

This study is exceptional in two ways: (1) it examines and compares citizens trust in public leaders across different levels, i.e. presidents, MPs and LGs in Africa and (2) it examines and compares the factors influencing citizens trust in public leaders in Africa comparatively.

Details

International Journal of Public Leadership, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2056-4929

Keywords

Open Access
Article
Publication date: 15 February 2024

Makutla Gibson Mojapelo

The purpose of this study was to investigate a framework for the implementation of freedom of information (FOI) legislation in South Africa, against Article 19’s nine principles…

Abstract

Purpose

The purpose of this study was to investigate a framework for the implementation of freedom of information (FOI) legislation in South Africa, against Article 19’s nine principles of FOI legislation.

Design/methodology/approach

This qualitative study used semi-structured interviews to collect data from six experts selected by means of the snowball sampling technique and content analysis. The study used a modified Delphi design consisting of two rounds of interviews.

Findings

The results showed that little effort is made by government officials to demonstrate commitment to the implementation of FOI legislation.

Practical implications

The passing of FOI is expected to reduce corruption, increase public participation, reduce the level of secrecy and increase transparency and openness. This is not the case as the implementation of this socioeconomic right in South Africa is faced by numerous challenges, such as a lack of political will, secrecy laws providing for the opposite of what the FOI legislation seeks to achieve, poor legislative interpretation and a lack of clear policies. The study proposes a framework aimed at addressing these challenges.

Originality/value

The study provides a framework for the implementation of FOI legislation. The framework was developed under the guidance of Article 19 principles of freedom of information legislation.

Details

Information Discovery and Delivery, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2398-6247

Keywords

Article
Publication date: 7 October 2022

Arcade Ndoricimpa

South African public debt has recently increased significantly and has reached worrying levels. This study aims to examine the debt threshold effects on economic growth in South…

Abstract

Purpose

South African public debt has recently increased significantly and has reached worrying levels. This study aims to examine the debt threshold effects on economic growth in South Africa, with an objective of suggesting a debt threshold as South African policymakers will seek to reduce debt to a sustainable level in the coming years.

Design/methodology/approach

The study applies a recent novel methodology advanced by Hansen (2017) that allows modelling a regression kink with an unknown threshold.

Findings

The findings of this study indicate a robust debt threshold of 37% of gross domestic product (GDP). Below this threshold, debt is growth-enhancing, but above 37% of GDP, debt is harmful to growth in South Africa.

Practical implications

Among other things, to reduce the debt-to-GDP ratio, South Africa will need a fiscal consolidation policy by undertaking reforms to state-owned companies to reduce their reliance on public funds, as well as putting in place economic measures to boost long-term growth. The country should also improve tax collection in order to realize additional tax revenue through enhancing compliance and other revenue collection measures.

Originality/value

Most of the existing studies on debt threshold effects in Africa are panel data studies, which assume parameter homogeneity, by determining a single debt threshold value applicable to all countries. This can be misleading as the debt-growth nexus is country-specific, being conditional on several factors, such as institutional quality. The present study applies a recent novel methodology, which allows to model a regression kink with an unknown threshold, for the case of South Africa. The methodology endogenously determines the debt threshold while also allowing a country-specific analysis.

Details

Journal of Economic and Administrative Sciences, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1026-4116

Keywords

Article
Publication date: 1 April 2024

Lorna Montgomery and Adi Cooper

Institutional abuse is a worldwide phenomenon with the UK also subject to several high-profile abuse scandals perpetuated on people with learning disabilities and/or mental health…

Abstract

Purpose

Institutional abuse is a worldwide phenomenon with the UK also subject to several high-profile abuse scandals perpetuated on people with learning disabilities and/or mental health conditions living within institutional settings. This study aims to provide a broad perspective of safeguarding practices within institutional care to inform practice and service development in this area.

Design/methodology/approach

A narrative overview was undertaken of a range of empirical evidence, discussion papers, enquiry reports, reports from regulatory bodies and professional guidance to explore safeguarding practices within institutional care for individuals with learning disabilities and/or mental health conditions.

Findings

A range of literature was identified that exposed and explored abuse in this context. Three key themes were identified: failings within institutional care; safeguarding issues and concerns; and good practice within institutional care. Whilst guidance is available, standards are explicit and protocols facilitate improvement potential in this area, a consistent message was that statutory recommendations for reform have not been effective.

Originality/value

This paper provides an important resource for practitioners and service providers involved in institutional care. An accessible overview of both the empirical evidence and grey literature on adult safeguarding within institutional settings is provided, along with a range of standards and resources that specify practice in these settings.

Details

The Journal of Adult Protection, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1466-8203

Keywords

Article
Publication date: 22 March 2024

Christian F. Durach and Leopoldo Gutierrez

This editorial for the 6th World Conference on Production and Operations Management (P&OM) 2022 Special Issue delves into the transformative role of advanced artificial…

Abstract

Purpose

This editorial for the 6th World Conference on Production and Operations Management (P&OM) 2022 Special Issue delves into the transformative role of advanced artificial intelligence (AI)-driven chatbots in reshaping operations, supply chain management and logistics (OSCM). It aligns with the conference’s theme of exploring the intersection between P&OM and strategy during the Technological Revolution.

Design/methodology/approach

Utilizing a conceptual approach, this paper introduces the “ERI Framework,” a tool designed to evaluate the impact of AI-driven chatbots in three critical operational dimensions: efficiency (E), responsiveness (R) and intelligence (I). This framework is grounded in disruptive debottlenecking theory and real-world applications, offering a novel structure for analysis.

Findings

The conceptual analysis suggests immediate benefits of chatbots in enhancing decision-making and resource allocation, thereby alleviating operational bottlenecks. However, it sees challenges such as workforce adaptation and potential impacts on creativity and sustainability.

Practical implications

The paper suggests that while chatbots present opportunities for optimizing operational processes, organizations must thoughtfully address the emerging challenges to maintain productivity and foster innovation. Strategic implementation and employee training are highlighted as key factors for successful integration.

Originality/value

Bridging the gap between the burgeoning proliferation of chatbots and their practical implications in OSCM, this paper offers a first perspective on the role of AI chatbots in modern business environments. By providing insights into both the benefits and challenges of chatbot integration, it offers a preliminary view essential for academics and practitioners in the digital age.

Details

International Journal of Physical Distribution & Logistics Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0960-0035

Keywords

Article
Publication date: 1 November 2023

Carri Reisdorf and Meghan Murray

One critical aspect of strong leadership communication is developing emotional (EQ) and spiritual intelligences (SQ). EQ helps individuals be more empathetic and effective, while…

119

Abstract

Purpose

One critical aspect of strong leadership communication is developing emotional (EQ) and spiritual intelligences (SQ). EQ helps individuals be more empathetic and effective, while SQ promotes an understanding of impacts beyond oneself. This paper aims to explore the relationship between leadership communication and EQ and SQ. Corporations can leverage leaders with high EQ and SQ and/or provide EQ/SQ training to employees.

Design/methodology/approach

Using critical review and integration, the authors consolidate existing literature and best practices to explore, develop and propose strategies for integrating EQ and SQ into the workplace.

Findings

Building upon existing theory and literature, the authors present a model of understanding both EQ and SQ. A generalized four-step process is presented for building EQ/SQ capabilities within the firm.

Originality/value

This study explores the synergy between an employee’s leadership skills and the ability to exhibit EQ and SQ. This research can provide corporations with tangible and targeted ways to enhance their EQ and SQ in their leaders. Firms can improve leveraging individuals with high SQ, in addition to providing SQ training to employees to improve individuals’ SQ.

Details

Journal of Business Strategy, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0275-6668

Keywords

Article
Publication date: 24 June 2022

Maitri Patel, Rajan Patel, Nimisha Patel, Parita Shah and Kamal Gulati

In the field of cryptography, authentication, secrecy and identification can be accomplished by use of secret keys for any computer-based system. The need to acquire certificates…

Abstract

Purpose

In the field of cryptography, authentication, secrecy and identification can be accomplished by use of secret keys for any computer-based system. The need to acquire certificates endorsed through CA to substantiate users for the barter of encoded communications is one of the most significant constraints for the extensive recognition of PKC, as the technique takes too much time and susceptible to error. PKC’s certificate and key management operating costs are reduced with IBC. IBE is a crucial primeval in IBC. The thought behind presenting the IBE scheme was to diminish the complexity of certificate and key management, but it also gives rise to key escrow and key revocation problem, which provides access to unauthorised users for the encrypted information.

Design/methodology/approach

This paper aims to compare the result of IIBES with the existing system and to provide security analysis for the same and the proposed system can be used for the security in federated learning.

Findings

Furthermore, it can be implemented using other encryption/decryption algorithms like elliptic curve cryptography (ECC) to compare the execution efficiency. The proposed system can be used for the security in federated learning.

Originality/value

As a result, a novel enhanced IBE scheme: IIBES is suggested and implemented in JAVA programming language using RSA algorithm, which eradicates the key escrow problem through eliminating the need for a KGC and key revocation problem by sing sub-KGC (SKGC) and a shared secret with nonce. IIBES also provides authentication through IBS as well as it can be used for securing the data in federated learning.

Details

International Journal of Pervasive Computing and Communications, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 16 May 2023

José Luis Usó Doménech, Hugh Gash, Josué Antonio Nescolarde-Selva and Lorena Segura-Abad

The process of elaboration of the symbolic universe leads to important insights into the role of symbols in understanding human reasoning. Symbols become explanatory axes of…

Abstract

Purpose

The process of elaboration of the symbolic universe leads to important insights into the role of symbols in understanding human reasoning. Symbols become explanatory axes of universal global realities. Myths were constructed on these explanatory paths forming a superstructure of all belief systems with paraconsistent logic for the symbolism and a symbolic syntax. Myths and symbols are to be found in all cultures. Some of the most powerful and influential ones occur in popular culture since these often have the greatest immediate social impact.

Design/methodology/approach

Semiotic and logical development of the symbols is in mythical systems. The dissolution of the myth and the degradation of the myth's symbols constitute a long-drawn-out process in modern Western society and wherever s influence reaches. Myth is a story that may contain symbolic elements, but compared to the symbols or images of the exceptional, myth is characterized by a “story.”

Findings

Starting from a minimal definition to define myths and propose the following definition: Myth is a traditional tale that relates memorable and exemplary actions of extraordinary personages in prestigious and distant times, and myths have various forms and functions, perhaps some more clearly defined with a signifier than others, and different approaches can be combined for a better understanding of the myths. Dispensing with such simplistic assertions, and starting from a minimal definition to define myth, myth is a traditional tale that relates memorable and exemplary actions of extraordinary personages in prestigious and distant times.

Originality/value

Any symbol F originates in a unit that has two aspects and functions when the unit is restored. Thus, the symbol is rather “for something” than “of something” and the symbolic objects express the objects' correspondence in one unit or hendiadys. One semantic characteristic of symbols is “recognition”. The symbol F reveals a reality by means of the homogenous association of the signifier and significance in the symbol's constitution; although reality is separate, there is a homogeneous relation between the symbolizing and symbolized in symbolization.

Details

Kybernetes, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0368-492X

Keywords

1 – 10 of 377