Search results
1 – 10 of 985Zhaobin Meng, Yueheng Lu and Hongyue Duan
The purpose of this paper is to study the following two issues regarding blockchain crowdsourcing. First, to design smart contracts with lower consumption to meet the needs of…
Abstract
Purpose
The purpose of this paper is to study the following two issues regarding blockchain crowdsourcing. First, to design smart contracts with lower consumption to meet the needs of blockchain crowdsourcing services and also need to design better interaction modes to further reduce the cost of blockchain crowdsourcing services. Second, to design an effective privacy protection mechanism to protect user privacy while still providing high-quality crowdsourcing services for location-sensitive multiskilled mobile space crowdsourcing scenarios and blockchain exposure issues.
Design/methodology/approach
This paper proposes a blockchain-based privacy-preserving crowdsourcing model for multiskill mobile spaces. The model in this paper uses the zero-knowledge proof method to make the requester believe that the user is within a certain location without the user providing specific location information, thereby protecting the user’s location information and other privacy. In addition, through off-chain calculation and on-chain verification methods, gas consumption is also optimized.
Findings
This study deployed the model on Ethereum for testing. This study found that the privacy protection is feasible and the gas optimization is obvious.
Originality/value
This study designed a mobile space crowdsourcing based on a zero-knowledge proof privacy protection mechanism and optimized gas consumption.
Details
Keywords
Renata Konrad, Solomiya Sorokotyaha and Daniel Walker
Conflict and violence are the main drivers of globally escalating humanitarian needs. Local grassroots initiatives are pivotal in distributing humanitarian supplies in the acute…
Abstract
Purpose
Conflict and violence are the main drivers of globally escalating humanitarian needs. Local grassroots initiatives are pivotal in distributing humanitarian supplies in the acute response phase until more established humanitarian aid organizations can enter. Nevertheless, scant research exists regarding the role of grassroots associations in providing humanitarian assistance during a military conflict. The purpose of this paper is to understand the role of grassroots associations and identify important themes for effective operations.
Design/methodology/approach
This paper adopts a case-study approach of three Ukrainian grassroots associations that began operating in the immediate days of the full-scale invasion of Ukraine. The findings are based on analyzing primary sources, including interviews with Ukrainian volunteers, and are supported by secondary sources.
Findings
Grassroots associations have local contacts and a contextual understanding of population needs and can respond more rapidly and effectively than large intergovernmental agencies. Four critical themes regarding the operations of grassroots associations emerged: information management, inventory management, coordination and performance measurement. Grassroots humanitarian response operations during conflict are challenged by personal security risks, the unpredictability of unsolicited supplies, emerging volunteer roles, dynamic transportation routes and shifting demands.
Originality/value
Grassroots responses are central to humanitarian responses during the acute phase of a military conflict. By examining the operations of grassroots associations in the early months of the 2022 war in Ukraine, the authors provide a unique perspective on humanitarian logistics. Nonetheless, more inclusive models of humanitarian responses are needed to harness the capacities and resilience of grassroots operations in practice.
Details
Keywords
Jui-Chung Kao, Hsiang-Yu Ma, Kao Rui-Hsin and Cheng-Chung Cho
The rise of communication software has changed our work style. The objectives of this study are: (1) to explore the effect of supervisors making after-hours work requests using…
Abstract
Purpose
The rise of communication software has changed our work style. The objectives of this study are: (1) to explore the effect of supervisors making after-hours work requests using communication software (SWRUCS) on employees’ job stress, quality of life and (2) to examine the moderating effect of personality traits and the cross-level contextual effect of social support.
Design/methodology/approach
A questionnaire survey was conducted to obtain information from 357 employees.
Findings
The results suggested that SWRUCS exacerbated job stress, which negatively impacted on quality of life and well-being. Moreover, different personality traits can either increase or decrease the positive or negative effect of SWRUCS on job stress. This study also revealed that social support can reduce employees’ job stress in a cross-level fashion. Furthermore, social support, especially organizational and supervisory support, can decrease the negative effect of job stress on employees’ quality of life and well-being.
Originality/value
Theoretically, this study has broadened the research scope of the organizational application of communication software, and practically, this study has demonstrated the reason why organizations should provide social support and select employees with suitable personality traits.
Details
Keywords
C. Bharanidharan, S. Malathi and Hariprasath Manoharan
The potential of vehicle ad hoc networks (VANETs) to improve driver and passenger safety and security has made them a hot topic in the field of intelligent transportation systems…
Abstract
Purpose
The potential of vehicle ad hoc networks (VANETs) to improve driver and passenger safety and security has made them a hot topic in the field of intelligent transportation systems (ITSs). VANETs have different characteristics and system architectures from mobile ad hoc networks (MANETs), with a primary focus on vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communication. But protecting VANETs from malicious assaults is crucial because they can undermine network security and safety.
Design/methodology/approach
The black hole attack is a well-known danger to VANETs. It occurs when a hostile node introduces phony routing tables into the network, potentially damaging it and interfering with communication. A safe ad hoc on-demand distance vector (AODV) routing protocol has been created in response to this issue. By adding cryptographic features for source and target node verification to the route request (RREQ) and route reply (RREP) packets, this protocol improves upon the original AODV routing system.
Findings
Through the use of cryptographic-based encryption and decryption techniques, the suggested method fortifies the VANET connection. In addition, other network metrics are taken into account to assess the effectiveness of the secure AODV routing protocol under black hole attacks, including packet loss, end-to-end latency, packet delivery ratio (PDR) and routing request overhead. Results from simulations using an NS-2.33 simulator show how well the suggested fix works to enhance system performance and lessen the effects of black hole assaults on VANETs.
Originality/value
All things considered, the safe AODV routing protocol provides a strong method for improving security and dependability in VANET systems, protecting against malevolent attacks and guaranteeing smooth communication between cars and infrastructure.
Details
Keywords
Bhavna Mahadew and Tinotenda Ganga
The primary purpose of this study is the development of Zimbabwe's rescue culture. The current framework for rescue operations was shaped by the historical development of laws…
Abstract
Purpose
The primary purpose of this study is the development of Zimbabwe's rescue culture. The current framework for rescue operations was shaped by the historical development of laws pertaining to insolvency and liquidation. Socioeconomic pressures in Zimbabwe can be attributed to some of the main factors that led to the need for rescue legislation and restructuring, which in turn fueled the shift from a culture that supported credit to one that supported debtors. The aim of this study is to offer an overview of the key ideas and principles of the corporate rescue programs now implemented in Mauritius and to investigate the ways in which these ideas and principles impacted the newly enacted Zimbabwean Insolvency Act.
Design/methodology/approach
This study adopts a comparative legal approach using Zimbabwe and Mauritius as comparative case studies. The fact that both countries are former British colonies and their insolvency legal framework inspired by common law makes them appropriate to be compared. Legislation and case law are used to conduct the comparative study with the aim of Zimbabwe drawing lessons from the Mauritian legal framework on insolvency. Mauritius is a nearly ideal subject for a comparative case study because of its vibrant and fairly successful bankruptcy law framework, as well as its fictional corporate rescue culture. These might provide Zimbabwe with some motivation and guidance.
Findings
The legal framework on insolvency in Zimbabwe has been found to be too stringent and does not provide companies with any lifeline. There is arguably a tendency of forcing companies out of business rather than implementing a rescue culture. Selected aspects of the Mauritian legal framework on insolvency can be mapped onto the Zimbabwean system to implement a much-needed rescue culture given its challenging economic context.
Originality/value
This study contributes to comparative legal literature in the field of insolvency. It is among the very few research work that compares the legal structure on insolvency of Zimbabwe and Mauritius in a collaborative endeavor to enhance the insolvency law and its application in Zimbabwe.
Details
Keywords
Keyu Chen, Guoquan Chen, Qiong Wu, Wei Liu and Huiqun Zhao
The literature on help-seeking at work has experienced significant growth in the past decades. However, our knowledge about this research domain remains fragmented and lacks…
Abstract
Purpose
The literature on help-seeking at work has experienced significant growth in the past decades. However, our knowledge about this research domain remains fragmented and lacks sufficient theoretical integration. Therefore, this paper aims to comprehensively integrate the extant literature on help-seeking behavior at work and propose an overarching, organized framework to propel this field forward.
Design/methodology/approach
A state-of-the-art review and theoretical development on help-seeking at work are conducted.
Findings
First, the authors provide the conceptual clarity of its definitions, key characteristics, types and measurement techniques. Second, the authors develop a fine-grained and integrative process-based framework consisting of antecedents, proximal psychological mechanisms, subsequent influencing processes and distal outcomes to advance our understanding of seeking help in the workplace. Third, the authors offer a detailed agenda for future research to target opportunities within the field.
Originality/value
The current study is comprehensive in surveying the full body of knowledge on help-seeking at work. It uniquely provides a coherent overarching framework that organizes prior findings and channels future research. Additionally, this review paints a complete picture of what has been done and what needs to be done in the field. More research can be spurred based on our conceptual framework.
Details
Keywords
Armando Calabrese, Antonio D'Uffizi, Nathan Levialdi Ghiron, Luca Berloco, Elaheh Pourabbas and Nathan Proudlove
The primary objective of this paper is to show a systematic and methodological approach for the digitalization of critical clinical pathways (CPs) within the healthcare domain.
Abstract
Purpose
The primary objective of this paper is to show a systematic and methodological approach for the digitalization of critical clinical pathways (CPs) within the healthcare domain.
Design/methodology/approach
The methodology entails the integration of service design (SD) and action research (AR) methodologies, characterized by iterative phases that systematically alternate between action and reflective processes, fostering cycles of change and learning. Within this framework, stakeholders are engaged through semi-structured interviews, while the existing and envisioned processes are delineated and represented using BPMN 2.0. These methodological steps emphasize the development of an autonomous, patient-centric web application alongside the implementation of an adaptable and patient-oriented scheduling system. Also, business processes simulation is employed to measure key performance indicators of processes and test for potential improvements. This method is implemented in the context of the CP addressing transient loss of consciousness (TLOC), within a publicly funded hospital setting.
Findings
The methodology integrating SD and AR enables the detection of pivotal bottlenecks within diagnostic CPs and proposes optimal corrective measures to ensure uninterrupted patient care, all the while advancing the digitalization of diagnostic CP management. This study contributes to theoretical discussions by emphasizing the criticality of process optimization, the transformative potential of digitalization in healthcare and the paramount importance of user-centric design principles, and offers valuable insights into healthcare management implications.
Originality/value
The study’s relevance lies in its ability to enhance healthcare practices without necessitating disruptive and resource-intensive process overhauls. This pragmatic approach aligns with the imperative for healthcare organizations to improve their operations efficiently and cost-effectively, making the study’s findings relevant.
Details
Keywords
This paper develops a debt-run model to study the effects of liquidity injections on debt markets in the presence of a renegotiation option. In the model, creditors decide when to…
Abstract
This paper develops a debt-run model to study the effects of liquidity injections on debt markets in the presence of a renegotiation option. In the model, creditors decide when to withdraw their funding and equityholders can renegotiate the contract terms of debt. We show that when equityholders have a large bargaining power, liquidity injections into distressed firms can rather cause more aggressive runs from their creditors, hurting the debt value. This outcome occurs because equityholders can strategically utilize the renegotiation option as a bankruptcy threat, pushing down the debt value below the potential liquidation value of the firm. In such a scenario, a deterred default resulting from emergency capital injections could be detrimental to creditors.
Details
Keywords
Joici Mendonça Muniz Gomes, Rodrigo Goyannes Gusmão Caiado, Taciana Mareth, Renan Silva Santos and Luiz Felipe Scavarda
To address the absence of Lean in transportation logistics in the digital era, this study aims to investigate the application of Lean transportation (LT) tools to reduce waste and…
Abstract
Purpose
To address the absence of Lean in transportation logistics in the digital era, this study aims to investigate the application of Lean transportation (LT) tools to reduce waste and facilitate the digital transformation of dedicated road transportation in the offshore industry.
Design/methodology/approach
The study adopts action research with a multimethod approach, including a scoping review, focus groups (FG) and participant observation. The research is conducted within the offshore supply chain of a major oil and gas company.
Findings
Implementing LT’s continuous improvement tools, particularly value stream mapping (VSM), reduces offshore transportation waste and provides empirical evidence about the intersection of Lean and digital technologies. Applying techniques drawn from organisational learning theory (OLT), stakeholders involved in VSM mapping and FGs engage in problem-solving and develop action plans, driving digital transformation. Waste reduction in loading and unloading stages leads to control actions, automation and process improvements, significantly reducing downtime. This results in an annual monetary gain of US$1.3m. The study also identifies waste related to human effort and underutilised digital resources.
Originality/value
This study contributes to theory and practice by using action research and LT techniques in a real intervention case. From the lens of OLT, it highlights the potential of LT tools for digital transformation and demonstrates the convergence of waste reduction through Lean and Industry 4.0 technologies in the offshore supply chain. Practical outputs, including a benchmarking questionnaire and a plan-do-check-act cycle, are provided for other companies in the same industry segment.
Details
Keywords
Dirk H.R. Spennemann, Jessica Biles, Lachlan Brown, Matthew F. Ireland, Laura Longmore, Clare L. Singh, Anthony Wallis and Catherine Ward
The use of generative artificial intelligence (genAi) language models such as ChatGPT to write assignment text is well established. This paper aims to assess to what extent genAi…
Abstract
Purpose
The use of generative artificial intelligence (genAi) language models such as ChatGPT to write assignment text is well established. This paper aims to assess to what extent genAi can be used to obtain guidance on how to avoid detection when commissioning and submitting contract-written assignments and how workable the offered solutions are.
Design/methodology/approach
Although ChatGPT is programmed not to provide answers that are unethical or that may cause harm to people, ChatGPT’s can be prompted to answer with inverted moral valence, thereby supplying unethical answers. The authors tasked ChatGPT to generate 30 essays that discussed the benefits of submitting contract-written undergraduate assignments and outline the best ways of avoiding detection. The authors scored the likelihood that ChatGPT’s suggestions would be successful in avoiding detection by markers when submitting contract-written work.
Findings
While the majority of suggested strategies had a low chance of escaping detection, recommendations related to obscuring plagiarism and content blending as well as techniques related to distraction have a higher probability of remaining undetected. The authors conclude that ChatGPT can be used with success as a brainstorming tool to provide cheating advice, but that its success depends on the vigilance of the assignment markers and the cheating student’s ability to distinguish between genuinely viable options and those that appear to be workable but are not.
Originality/value
This paper is a novel application of making ChatGPT answer with inverted moral valence, simulating queries by students who may be intent on escaping detection when committing academic misconduct.
Details