Search results
1 – 8 of 8David Finkel, Craig E. Wills, Michael J. Ciaraldi, Kevin Amorin, Adam Covati and Michael Lee
Anonymous distributed computing systems consist of potentially millions of heterogeneous processing nodes connected by the global Internet. These nodes can be administered by…
Abstract
Anonymous distributed computing systems consist of potentially millions of heterogeneous processing nodes connected by the global Internet. These nodes can be administered by thousands of organizations and individuals, with no direct knowledge of each other. This work defines anonymous distributed computing systems in general then focuses on the specifics of an applet‐based approach for large‐scale, anonymous, distributed computing on the Internet. A user wishing to participate in a computation connects to a distribution server, which provides information about available computations, and then connects to a computation server with a computation to distribute. A Java class is downloaded, which communicates with the computation server to obtain data, performs the computation, and returns the result. Since any computer on the Internet can participate in these computations, potentially a large number of computers can participate in a single computation.
Details
Keywords
Anita Philips, Jayakumar Jayaraj, Josh F.T. and Venkateshkumar P.
Digitizing of the electrical power grid promotes the advantages of efficient energy management alongside the possibilities of major vulnerabilities. A typical inadequacy that…
Abstract
Purpose
Digitizing of the electrical power grid promotes the advantages of efficient energy management alongside the possibilities of major vulnerabilities. A typical inadequacy that needs critical attention to ensure the seamless operation of the smart grid system remains in the data transmission between consumer premises smart devices and the utility centres. Many researches aim at establishing security protocols to ensure secure and efficient energy management resulting in perfect demand–supply balance.
Design/methodology/approach
In this paper, the authentication of the smart meter data has been proposed with enhanced Rivest–Shamir–Adleman (RSA) key encryption using an efficient way of generating large prime numbers. The trapdoor one-way function applied in the RSA algorithm makes it almost impossible for the reverse engineering attempts of cracking the key pair.
Findings
The algorithm for generating prime numbers has been tested both with the convention method and with the enhanced method of including a low-level primality test with a first few hundred primes. The combination of low-level and high-level primality tests shows an improvement in execution time of the algorithm.
Originality/value
There is a considerable improvement in the time complexities when using the combination method. This efficient generation of prime numbers can be successfully applied to the smart meter systems, thereby increasing the strength and speed of the key encryption.
Details
Keywords
This is a review of a book of the same title written by Cristian Calude. A discussion is presented of the elements of computability and complexity theory and the origins of the…
Abstract
This is a review of a book of the same title written by Cristian Calude. A discussion is presented of the elements of computability and complexity theory and the origins of the theory discussed. The book is said to contain enough information for several different courses from undergraduate introduction to advanced graduate courses in algorithms and complexity (including the theories of Blum, Kolmogorov and Martin‐Löf).
Details
Keywords
In this paper we discuss some basic notions of modern cryptography: public key systems and digital signatures. We show how theoretical modern cryptography can come to the rescue…
Abstract
In this paper we discuss some basic notions of modern cryptography: public key systems and digital signatures. We show how theoretical modern cryptography can come to the rescue of the Internet, offering solutions to its security problems.
Cong Doanh Duong, Duc Tho Bui, Huong Thao Pham, Anh Trong Vu and Van Hoang Nguyen
The emergence of artificial intelligence technologies, like ChatGPT, has taken the world by storm, particularly in the education sector. This study aims to adopt the unified…
Abstract
Purpose
The emergence of artificial intelligence technologies, like ChatGPT, has taken the world by storm, particularly in the education sector. This study aims to adopt the unified theory of acceptance and use of technology to explore how effort expectancy (EEC) and performance expectancy (PEE) individually, jointly, congruently and incongruently affect higher education students’ intentions and actual uses of ChatGPT for their learning.
Design/methodology/approach
An advanced methodology – polynomial regression with response surface analysis – and a sample of 1,461 higher education students recruited in Vietnam through three-phase stratified random sampling approach were adopted to test developed hypotheses.
Findings
Both EEC and PEE were found to have a direct positive impact on the likelihood of higher education students’ intention to use ChatGPT, which in turn promotes them actually use this tool for learning purposes. Conversely, a large incongruence between EEC and PEE will lower the level of intentions and actual uses of ChatGPT for learning. However, when there is a growing incongruence between EEC and PEE, either in a positive or negative direction, the likelihood of students’ intentions to use ChatGPT for learning decreases.
Practical implications
Some practical implications are subsequently recommended to obtain advantages and address potential threats arising from the implementation of this novel technology in the education context.
Originality/value
This study shed the new light on the educational setting by testing how higher education students’ intentions to use ChatGPT and subsequent actual uses of ChatGPT are synthesized from the balance between high EEC and PEE.
Details
Keywords
Yingying Liao, Ebrahim Soltani, Fangrong Li and Chih-Wen Ting
Prior research examining cultural effects on customer service expectations has primarily used more generic Western cultural theory on an aggregate scale or with only a single…
Abstract
Purpose
Prior research examining cultural effects on customer service expectations has primarily used more generic Western cultural theory on an aggregate scale or with only a single variable to draw conclusions on a customer’s underlying reasoning for buying a service. This study aims to focus on culturally distinct clusters within non-Western nations, specifically exploring within-cluster differences in service expectations within the Confucian Asia cluster.
Design/methodology/approach
This study developed a measurement model of Chinese cultural values and service expectations, consisting of a three and five-factor structure, respectively. Data from a sample of 351 diners were analysed using SmartPLS software. The data was compared with similar studies within the Confucian Asia cluster to understand the culture effect on service expectations and within-cluster variations.
Findings
The findings underscore the varying importance of cultural values in shaping customer service expectations, emphasizing their relative, rather than equal, significance. The study provides insights into potential within-group differences in customer service expectations within the same cultural cluster – without losing sight of the fundamental cultural heterogeneity of the Confucian culture.
Practical implications
Managers should leverage the distinct cultural values of their operating country to gain insights into diverse customer groups, predict their behaviours and meet their needs and expectations.
Originality/value
This study offers valuable insights to both service management scholars and practitioners by focusing on culturally distinct clusters of non-Western nations and exploring their effects on variation in service expectations within these clusters.
Details
Keywords
Varsha Jain, Preeti Shroff, Altaf Merchant and Subhalakshmi Bezbaruah
A place brand is a culmination of its exclusive history, people and traditions that affect customer and community experiences. Place branding has become increasingly important for…
Abstract
Purpose
A place brand is a culmination of its exclusive history, people and traditions that affect customer and community experiences. Place branding has become increasingly important for collective heritage brand strategy, as stakeholders undertake efforts to create an aura of a distinctive geographic location. Though place branding has received considerable scholarly attention, there is a lacuna: the role of residents as co-creators of a place and its heritage. Accordingly, this paper aims to develop a “bi-directional participatory place branding” model by applying the stimulus–organism–response approach grounded theory.
Design/methodology/approach
A grounded theory approach with multi-sited ethnography, personal interviews (with residents and city leaders) and observational techniques were adopted in a UNESCO world heritage city of India, Ahmedabad.
Findings
The findings indicate that the people (residents) aspect of place branding is associated with their life stories, past experiences, feelings and aspirations. However, the place acts as a nostalgia enabler, disseminating symbolic and heritage metaphors to residents and visitors as place brand ambassadors. When the place and people components are perceived positively, residents participate involve themselves with the place and thus, in turn, become the place ambassadors.
Originality/value
No prior studies have analyzed the association between residents, the place where they reside and the resultant behavior toward the place. The unique contribution is the bi-directional participatory place branding model, especially involving a UNESCO world heritage city rather than solely a site.
Details
Keywords
Hardeep Singh Mundi and Deepak Kumar
This paper aims to review, systematize and integrate existing research on alternative investments. This study conducts performance analysis comprising production timeline…
Abstract
Purpose
This paper aims to review, systematize and integrate existing research on alternative investments. This study conducts performance analysis comprising production timeline, country-wise contributions, analysis of sources, affiliations, the geography of authors and citations of studies on alternative investments.
Design/methodology/approach
This study adopts a thematic and bibliometric analysis methodology on 570 papers identified from mainstream literature on alternative investments. This study provides an analysis of science mapping, including co-citation analysis, bibliometric coupling, word analysis and trending topics on alternative investments. In addition, the study presents thematic analysis by classifying existing studies into nine themes.
Findings
Alternative investments provide diversification benefits and play a critical role in portfolio construction, and the research on alternative investments has gained momentum in recent times. This study finds that hedge funds, private equity, artwork, collectibles, commodities, fine wine and venture capital have remained prominent themes in the field. Investments in cryptocurrencies are an emerging area in the research on alternative investments.
Research limitations/implications
This study limits itself to the papers published in the area of finance and economics listed on the Scopus database.
Originality/value
This study provides quantitative bibliometric analysis and thematic analysis of the extant literature on alternative investments and identifies the areas that could be developed to advance research on alternative investments.
Details