Search results

1 – 10 of over 9000
Article
Publication date: 11 January 2024

Matthias Walther, Ulrike Mayrhofer and Noémie Dominguez

This exploratory research aims to identify the types of social networks established by German and French expatriates.

Abstract

Purpose

This exploratory research aims to identify the types of social networks established by German and French expatriates.

Design/methodology/approach

The authors use the concepts of social capital and social networks, as well as the societal and cultural approaches, to investigate the way expatriates develop their social networks. The authors' empirical study is based on 40 semi-structured interviews conducted with German and French expatriates.

Findings

The authors' findings show that German expatriates mainly establish professional networks, whereas their French counterparts also focus on personal networks. They further indicate that managing social capital lies within the individual responsibility of German expatriates, whereas it is part of higher education institutions in France.

Originality/value

The authors highlight the way German and French expatriates manage their social networks and provide novel insights into the role played by higher education systems and the cultural characteristics of their home country context.

Details

Career Development International, vol. 29 no. 1
Type: Research Article
ISSN: 1362-0436

Keywords

Article
Publication date: 2 January 2023

Deepak Choudhary

As the number of devices that connect to the Internet of Things (IoT) has grown, privacy and security issues have come up. Because IoT devices collect so much sensitive…

Abstract

Purpose

As the number of devices that connect to the Internet of Things (IoT) has grown, privacy and security issues have come up. Because IoT devices collect so much sensitive information, like user names, locations, phone numbers and even how they usually use energy, it is very important to protect users' privacy and security. IoT technology will be hard to use on the client side because IoT-enabled devices do not have clear privacy and security controls.

Design/methodology/approach

IoT technology would be harder to use on the client side if the IoT did not offer enough well-defined ways to protect users’ privacy and security. The goal of this research is to protect people's privacy in the IoT by using the oppositional artificial flora optimization (EGPKC-OAFA) algorithm to generate the best keys for the ElGamal public key cryptosystem (EGPKC). The EGPKC-OAFA approach puts the most weight on the IEEE 802.15.4 standard for MAC, which is the most important part of the standard. The security field is part of the MAC header of this standard. In addition, the MAC header includes EGPKC, which makes it possible to make authentication keys as quickly as possible.

Findings

With the proliferation of IoT devices, privacy and security have become major concerns in the academic world. Security and privacy are of the utmost importance due to the large amount of personally identifiable information acquired by IoT devices, such as name, location, phone numbers and energy use. Client-side deployment of IoT technologies will be hampered by the absence of well-defined privacy and security solutions afforded by the IoT. The purpose of this research is to present the EGPKC with optimum key generation using the EGPKC-OAFA algorithm for the purpose of protecting individual privacy within the context of the IoT. The EGPKC-OAFA approach is concerned with the MAC standard defined by the IEEE 802.15.4 standard, which includes the security field in its MAC header. Also, the MAC header incorporates EGPKC, which enables the fastest possible authentication key generation. In addition, the best methodology award goes to the OAFA strategy, which successfully implements the optimum EGPKC selection strategy by combining opposition-based (OBL) and standard AFA ideas. The EGPKC-OAFA method has been proved to effectively analyze performance in a number of simulations, with the results of various functions being identified.

Originality/value

In light of the growing prevalence of the IoT, an increasing number of people are becoming anxious about the protection and confidentiality of the personal data that they save online. This is especially true in light of the fact that more and more things are becoming connected to the internet. The IoT is capable of gathering personally identifiable information such as names, addresses and phone numbers, as well as the quantity of energy that is used. It will be challenging for customers to adopt IoT technology because of worries about the security and privacy of the data generated by users. In this work, the EGPKC is paired with adversarial artificial flora, which leads in an increase to the privacy security provided by EGPKC for the IoT (EGPKC-OAFA). The MAC security field that is part of the IEEE 802.15.4 standard is one of the areas that the EGPKC-OAFA protocol places a high focus on. The Authentication Key Generation Protocol Key Agreement, also known as EGPKCA, is used in MAC headers. The abbreviation for this protocol is EGPKCA. The OAFA technique, also known as the combination of OBL and AFA, is the most successful method for selecting EGPKCs. This method is recognized by its acronym, OAFA. It has been shown via a variety of simulations that the EGPKC-OAFA technique is a very useful instrument for carrying out performance analysis.

Details

International Journal of Pervasive Computing and Communications, vol. 19 no. 5
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 17 May 2023

Ishita Seth, Kalpna Guleria and Surya Narayan Panda

The internet of vehicles (IoV) communication has recently become a popular research topic in the automotive industry. The growth in the automotive sector has resulted in…

25

Abstract

Purpose

The internet of vehicles (IoV) communication has recently become a popular research topic in the automotive industry. The growth in the automotive sector has resulted in significant standards and guidelines that have engaged various researchers and companies. In IoV, routing protocols play a significant role in enhancing communication safety for the transportation system. The high mobility of nodes in IoV and inconsistent network coverage in different areas make routing challenging. This paper aims to provide a lane-based advanced forwarding protocol for internet of vehicles (LAFP-IoV) for efficient data distribution in IoV. The proposed protocol’s main feature is that it can identify the destination zone by using position coordinates and broadcasting the packets toward the direction of destination. The novel suppression technique is used in the broadcast method to reduce the network routing overhead.

Design/methodology/approach

The proposed protocol considers the interferences between different road segments, and a novel lane-based forwarding model is presented. The greedy forwarding notion, the broadcasting mechanism, and the suppression approach are used in this protocol to reduce the overhead generated by standard beacon forwarding procedures. The SUMO tool and NS-2 simulator are used for the vehicle's movement pattern and to simulate LAFP-IoV.

Findings

The simulation results show that the proposed LAFP-IoV protocol performs better than its peer protocols. It uses a greedy method for forwarding data packets and a carry-and-forward strategy to recover from the local maximum stage. This protocol's low latency and good PDR make it ideal for congested networks.

Originality/value

The proposed paper provides a unique lane-based forwarding for IoV. The proposed work achieves a higher delivery ratio than its peer protocols. The proposed protocol considers the lanes while forwarding the data packets applicable to the highly dense scenarios.

Article
Publication date: 4 February 2022

Hingmire Vishal Sharad, Santosh R. Desai and Kanse Yuvraj Krishnrao

In a wireless sensor network (WSN), the sensor nodes are distributed in the network, and in general, they are linked through wireless intermediate to assemble physical data. The…

Abstract

Purpose

In a wireless sensor network (WSN), the sensor nodes are distributed in the network, and in general, they are linked through wireless intermediate to assemble physical data. The nodes drop their energy after a specific duration because they are battery-powered, which also reduces network lifetime. In addition, the routing process and cluster head (CH) selection process is the most significant one in WSN. Enhancing network lifetime through balancing path reliability is more challenging in WSN. This paper aims to devise a multihop routing technique with developed IIWEHO technique.

Design/methodology/approach

In this method, WSN nodes are simulated originally, and it is fed to the clustering process. Meanwhile, the CH is selected with low energy-based adaptive clustering model with hierarchy (LEACH) model. After CH selection, multipath routing is performed by developed improved invasive weed-based elephant herd optimization (IIWEHO) algorithm. In addition, the multipath routing is selected based on certain fitness functions like delay, energy, link quality and distance. However, the developed IIWEHO technique is the combination of IIWO method and EHO algorithm.

Findings

The performance of developed optimization method is estimated with different metrics, like distance, energy, delay and throughput and achieved improved performance for the proposed method.

Originality/value

This paper presents an effectual multihop routing method, named IIWEHO technique in WSN. The developed IIWEHO algorithm is newly devised by incorporating EHO and IIWO approaches. The fitness measures, which include intra- and inter-distance, delay, link quality, delay and consumption of energy, are considered in this model. The proposed model simulates the WSN nodes, and CH selection is done by the LEACH protocol. The suitable CH is chosen for transmitting data through base station from the source to destination. Here, the routing system is devised by a developed optimization technique. The selection of multipath routing is carried out using the developed IIWEHO technique. The developed optimization approach selects the multipath depending on various multi-objective functions.

Details

International Journal of Pervasive Computing and Communications, vol. 19 no. 3
Type: Research Article
ISSN: 1742-7371

Keywords

Open Access
Article
Publication date: 31 August 2023

Ginevra Gravili, Rohail Hassan, Alexandru Avram and Francesco Schiavone

This paper aims to examine the influence of big data (BD) on human resource management (HRM). It defines how these data can be a useful tool in the decision-making process of…

2529

Abstract

Purpose

This paper aims to examine the influence of big data (BD) on human resource management (HRM). It defines how these data can be a useful tool in the decision-making process of companies’ human resources to obtain a sustainable competitive advantage.

Design/methodology/approach

This paper emphasizes the need to develop a holistic approach to emphasize these relations. Starting from these observations, the document proposes empirical research employing Eurostat data to test the benefits of BD in HRM decisions that optimize the relationship between training, productivity, and well-being.

Findings

The findings estimate HRM decisions and their impact in a broader macroeconomic and microeconomic perspective.

Originality/value

BD research is emerging as a crucial discipline in human resources. To overcome this problem, the paper develops an analysis of the literature on cleaner production and sustainability context; it creates a conceptual framework to clarify whether the existing studies consider the growing intensity of BD on human resources.

Details

European Journal of Innovation Management, vol. 26 no. 7
Type: Research Article
ISSN: 1460-1060

Keywords

Article
Publication date: 12 December 2023

Mustafa Çimen, Damla Benli, Merve İbiş Bozyel and Mehmet Soysal

Vehicle allocation problems (VAPs), which are frequently confronted in many transportation activities, primarily including but not limited to full truckload freight transportation…

Abstract

Purpose

Vehicle allocation problems (VAPs), which are frequently confronted in many transportation activities, primarily including but not limited to full truckload freight transportation operations, induce a significant economic impact. Despite the increasing academic attention to the field, literature still fails to match the needs of and opportunities in the growing industrial practices. In particular, the literature can grow upon the ideas on sustainability, Industry 4.0 and collaboration, which shape future practices not only in logistics but also in many other industries. This review has the potential to enhance and accelerate the development of relevant literature that matches the challenges confronted in industrial problems. Furthermore, this review can help to explore the existing methods, algorithms and techniques employed to address this problem, reveal directions and generate inspiration for potential improvements.

Design/methodology/approach

This study provides a literature review on VAPs, focusing on quantitative models that incorporate any of the following emerging logistics trends: sustainability, Industry 4.0 and logistics collaboration.

Findings

In the literature, sustainability interactions have been limited to environmental externalities (mostly reducing operational-level emissions) and economic considerations; however, emissions generated throughout the supply chain, other environmental externalities such as waste and product deterioration, or the level of stakeholder engagement, etc., are to be monitored in order to achieve overall climate-neutral services to the society. Moreover, even though there are many types of collaboration (such as co-opetition and vertical collaboration) and Industry 4.0 opportunities (such as sharing information and comanaging distribution operations) that could improve vehicle allocation operations, these topics have not yet received sufficient attention from researchers.

Originality/value

The scientific contribution of this study is twofold: (1) This study analyses decision models of each reviewed article in terms of decision variable, constraint and assumption sets, objectives, modeling and solving approaches, the contribution of the article and the way that any of sustainability, Industry 4.0 and collaboration aspects are incorporated into the model. (2) The authors provide a discussion on the gaps in the related literature, particularly focusing on practical opportunities and serving climate-neutrality targets, carried out under four main streams: logistics collaboration possibilities, supply chain risks, smart solutions and various other potential practices. As a result, the review provides several gaps in the literature and/or potential research ideas that can improve the literature and may provide positive industrial impacts, particularly on how logistics collaboration may be further engaged, which supply chain risks are to be incorporated into decision models, and how smart solutions can be employed to cope with uncertainty and improve the effectiveness and efficiency of operations.

Details

The International Journal of Logistics Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0957-4093

Keywords

Abstract

Details

Understanding Intercultural Interaction: An Analysis of Key Concepts, 2nd Edition
Type: Book
ISBN: 978-1-83753-438-8

Open Access
Book part
Publication date: 30 November 2023

Francois van Schalkwyk and Nico Cloete

Relations in university settings are becoming more heterogeneous in terms of race, ethnicity, religion, nationality, class, and gender. In South Africa, transformation imperatives…

Abstract

Relations in university settings are becoming more heterogeneous in terms of race, ethnicity, religion, nationality, class, and gender. In South Africa, transformation imperatives have radically changed the complexion of the country’s university campuses but have also entrenched political imperatives in its universities. As a consequence, the university is a highly politicised space. This is not new. What is new is a communication environment characterised by real-time, global networked digital communication and the uptake of digital media platforms (including social media platforms). We explore the effects of politicisation and new modes of communication using the case of a controversial article published in a South Africa journal and the ensuing polemic. Drawing on both institutional theory and Castells’ description of the network society, we conceptualise collegiality along two dimensions: horizontal collegial relations which exist for the purpose of knowledge creation and transfer which, in turn, depends on self-governance according to a taken-for-granted code of conduct; and vertical collegiality which describes collegial relations between academic staff and university management, and which is necessary for the governance of the university as a complex organisation. We conclude that the highly personal nature of communication that is propelled by digital communication has a direct impact on collegial relations within the university. The motivations of both university academic staff and management, as well as the public, extend beyond stimulating collective debate in the service of knowledge production to serving individual and/or ideological agendas as the communication of science becomes politicised. While issues pertaining to collegiality in South Africa may at first glance appear to be unique to the country, we believe that in a globally transforming academy, the South African case may offer novel insights and useful lessons for other highly politicised university systems.

Details

University Collegiality and the Erosion of Faculty Authority
Type: Book
ISBN: 978-1-80455-814-0

Keywords

Article
Publication date: 14 September 2023

Kangning Liu, Bon-Gang Hwang, Jianyao Jia, Qingpeng Man and Shoujian Zhang

Informal learning networks are critical to response to calls for practitioners to reskill and upskill in off-site construction projects. With the transition to the coronavirus…

Abstract

Purpose

Informal learning networks are critical to response to calls for practitioners to reskill and upskill in off-site construction projects. With the transition to the coronavirus disease 2019 (COVID-19) pandemic, social media-enabled online knowledge communities play an increasingly important role in acquiring and disseminating off-site construction knowledge. Proximity has been identified as a key factor in facilitating interactive learning, yet which type of proximity is effective in promoting online and offline knowledge exchange remains unclear. This study takes a relational view to explore the proximity-related antecedents of online and offline learning networks in off-site construction projects, while also examining the subtle differences in the networks' structural patterns.

Design/methodology/approach

Five types of proximity (physical, organizational, social, cognitive and personal) between projects members are conceptualized in the theoretical model. Drawing on social foci theory and homophily theory, the research hypotheses are proposed. To test these hypotheses, empirical case studies were conducted on two off-site construction projects during the COVID-19 pandemic. Valid relational data provided by 99 and 145 project members were collected using semi-structured interviews and sociometric questionnaires. Subsequently, multivariate exponential random graph models were developed.

Findings

The results show a discrepancy arise in the structural patterns between online and offline learning networks. Offline learning is found to be more strongly influenced by proximity factors than online learning. Specifically, physical, organizational and social proximity are found to be significant predictors of offline knowledge exchange. Cognitive proximity has a negative relationship with offline knowledge exchange but is positively related to online knowledge exchange. Regarding personal proximity, the study found that the homophily effect of hierarchical status merely emerges in offline learning networks. Online knowledge communities amplify the receiver effect of tenure. Furthermore, there appears to be a complementary relationship between online and offline learning networks.

Originality/value

Proximity offers a novel relational perspective for understanding the formation of knowledge exchange connections. This study enriches the literature on informal learning within project teams by revealing how different types of proximity shape learning networks across different channels in off-site construction projects.

Details

Engineering, Construction and Architectural Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0969-9988

Keywords

Open Access
Book part
Publication date: 29 November 2023

Elliott Kulakowski

The International Network of Research Management Societies (INORMS) celebrated its 20th anniversary in 2021. It was established to increase communication among research management…

Abstract

The International Network of Research Management Societies (INORMS) celebrated its 20th anniversary in 2021. It was established to increase communication among research management societies. The need for a formal international research management community developed because there was (1) increased international funding of research, (2) the number of international research collaborations was growing, and (3) there was a need to understand research regulations in other countries. INORMS sought to address these issues through international congresses and by providing a forum for member societies to work more closely together on common issues. Membership in INORMS steadily increased over the years. The 20th anniversary meeting was highlighted with the signing of the Hiroshima Statement that described a research manager’s principles and responsibilities, which include collegiality, inclusiveness, professionalisation, innovation, and accountability. This chapter summarises the factors that led to the formation of INORMS and its history.

Details

The Emerald Handbook of Research Management and Administration Around the World
Type: Book
ISBN: 978-1-80382-701-8

Keywords

1 – 10 of over 9000