Search results

1 – 10 of over 6000
Open Access
Article
Publication date: 18 January 2023

Gregor Polančič and Boštjan Orban

Despite corporate communications having an immense impact on corporate success, there is a lack of dedicated techniques for their management and visualization. A potential…

2386

Abstract

Purpose

Despite corporate communications having an immense impact on corporate success, there is a lack of dedicated techniques for their management and visualization. A potential strategy is to apply business process management (BPM) approach with business process model and notation (BPMN) modeling techniques.

Design/methodology/approach

The goal of this study was to gain empirical insights into the cognitive effectiveness of BPMN-based corporate communications modeling. To this end, experimental research was performed in which subjects tested two modeling notations – standardized BPMN conversation diagrams and a BPMN extension with corporate communications-specific concepts.

Findings

Standard conversation diagrams were demonstrated to be more time-efficient for designing and interpreting diagrams. However, the subjects made significantly fewer mistakes when interpreting the diagrams modeled in the BPMN extension. Subjects also evolved positive perceptions toward the proposed extension.

Practical implications

BPMN-based corporate communications modeling may be applied to organizations to depict how formal communications are or should be performed consistently, effectively and transparently by following and integrating with BPM approaches and modeling techniques.

Originality/value

The paper provides empirical insights into the cognitive effectiveness of corporate communications modeling based on BPMN and positions the corresponding models into typical process architecture.

Details

Business Process Management Journal, vol. 29 no. 8
Type: Research Article
ISSN: 1463-7154

Keywords

Article
Publication date: 27 February 2024

Feng Qian, Yongsheng Tu, Chenyu Hou and Bin Cao

Automatic modulation recognition (AMR) is a challenging problem in intelligent communication systems and has wide application prospects. At present, although many AMR methods…

Abstract

Purpose

Automatic modulation recognition (AMR) is a challenging problem in intelligent communication systems and has wide application prospects. At present, although many AMR methods based on deep learning have been proposed, the methods proposed by these works cannot be directly applied to the actual wireless communication scenario, because there are usually two kinds of dilemmas when recognizing the real modulated signal, namely, long sequence and noise. This paper aims to effectively process in-phase quadrature (IQ) sequences of very long signals interfered by noise.

Design/methodology/approach

This paper proposes a general model for a modulation classifier based on a two-layer nested structure of long short-term memory (LSTM) networks, called a two-layer nested structure (TLN)-LSTM, which exploits the time sensitivity of LSTM and the ability of the nested network structure to extract more features, and can achieve effective processing of ultra-long signal IQ sequences collected from real wireless communication scenarios that are interfered by noise.

Findings

Experimental results show that our proposed model has higher recognition accuracy for five types of modulation signals, including amplitude modulation, frequency modulation, gaussian minimum shift keying, quadrature phase shift keying and differential quadrature phase shift keying, collected from real wireless communication scenarios. The overall classification accuracy of the proposed model for these signals can reach 73.11%, compared with 40.84% for the baseline model. Moreover, this model can also achieve high classification performance for analog signals with the same modulation method in the public data set HKDD_AMC36.

Originality/value

At present, although many AMR methods based on deep learning have been proposed, these works are based on the model’s classification results of various modulated signals in the AMR public data set to evaluate the signal recognition performance of the proposed method rather than collecting real modulated signals for identification in actual wireless communication scenarios. The methods proposed in these works cannot be directly applied to actual wireless communication scenarios. Therefore, this paper proposes a new AMR method, dedicated to the effective processing of the collected ultra-long signal IQ sequences that are interfered by noise.

Details

International Journal of Web Information Systems, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1744-0084

Keywords

Article
Publication date: 29 March 2024

Njod Aljabr, Dimitra Petrakaki and Petros Chamakiotis

Existing research on how professionals manage after-hours connectivity to work has been dominated by studies on the strategies/practices individuals develop. In these studies…

Abstract

Purpose

Existing research on how professionals manage after-hours connectivity to work has been dominated by studies on the strategies/practices individuals develop. In these studies, mobile technology is perceived as a tool or an enabler that supports otherwise human-centric connectivity decisions. This view sees technology as separate or external to the organisation, missing out on its nuanced role in shaping connectivity decisions. Our study aims to bring technology back into the sociomaterially imbricated context of connectivity and to unpack its parameters.

Design/methodology/approach

Drawing on data collected from documents and semi-structured interviews, we adopt the framework of “sociomaterial imbrications” (Leonardi, 2011) to understand the social and material parameters that influence connectivity management practices at two different academic institutions in Saudi Arabia.

Findings

The study identifies a set of social and material parameters (organisational, individual, technological and situational) that imbricate to shape, collectively and not individually, professionals’ connectivity management practices. Connectivity decisions to change practice (such as decisions of where, when or why to connect) or technology (how to connect) are not as distinct as they appear but originate from, and are founded on, imbricated sociomaterial parameters. Our study further suggests that connectivity decisions are shaped by individuals’ perceptions of sociomaterial imbrications, but decisions are not solely idiosyncratic. The context within which connectivity decisions are taken influences the type of decisions made.

Originality/value

Connectivity management emerged from sociomaterial imbrications within a context constitutive of four interacting parameters: organisational, technological, situational and individual. Decisions around the “how” and the “what” of connectivity – i.e. the practice of connectivity and its underpinning technology – originate from how people perceive sociomaterial imbrications as enabling or constraining within a context. Individual perceptions account for changes in practice and in technology, but the context they find themselves in is also important. For instance, we show that professionals may perceive a certain technology as affording, but eventually they may use another technology for communications due to social norms.

Details

Information Technology & People, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 19 January 2024

Thomas Koch, Benno Viererbl, Johannes Beckert and Juliane Keilmann

When a crisis occurs, do corporate social responsibility (CSR) activities protect organizational reputation by buffering negative effects or do CSR activities intensify negative…

Abstract

Purpose

When a crisis occurs, do corporate social responsibility (CSR) activities protect organizational reputation by buffering negative effects or do CSR activities intensify negative effects, potentially leading to a worse reputation compared to if the organization had no prior CSR engagement? The authors hypothesize that if a crisis emerges in a domain aligned with an organization’s CSR initiatives (crisis-congruent CSR) backfire effects would arise, adversely affecting the organization’s reputation. Conversely, in cases of incongruence, where the crisis emerges in a domain not aligned with an organization’s previous CSR involvement, a buffering effect would manifest, protecting the organization’s reputation.

Design/methodology/approach

The authors conducted an experiment with a 3 (crisis-congruent, crisis-incongruent, and no CSR activities) × 2 (repeated measures) mixed factorial design. In the first scenario, no information was provided concerning a company’s social commitment. Alternatively, participants were exposed to an article illustrating the company’s dedication either to healthcare (crisis-incongruent commitment) or to combating sexism (crisis-congruent commitment). Afterward, participants were presented with a newspaper article addressing allegations of sexism against the company’s CEO.

Findings

The findings demonstrate that prior CSR activities have the potential both to serve as a buffer and to cause backfire effects in times of crisis. Domain congruence is the decisive moderator of these effects: Crisis-incongruent CSR activities acted as a buffer, crisis-congruent CSR activities “backfired” and led to more negative perceptions of the company’s reputation.

Originality/value

The study directly contributes to the understanding of CSR effects in crisis communication, while also addressing the often paradoxical and contradictory findings of prior studies.

Details

Journal of Communication Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1363-254X

Keywords

Article
Publication date: 16 January 2023

Faisal Lone, Harsh Kumar Verma and Krishna Pal Sharma

The purpose of this study is to extensively explore the vehicular network paradigm, challenges faced by them and provide a reasonable solution for securing these vulnerable…

Abstract

Purpose

The purpose of this study is to extensively explore the vehicular network paradigm, challenges faced by them and provide a reasonable solution for securing these vulnerable networks. Vehicle-to-everything (V2X) communication has brought the long-anticipated goal of safe, convenient and sustainable transportation closer to reality. The connected vehicle (CV) paradigm is critical to the intelligent transportation systems vision. It imagines a society free of a troublesome transportation system burdened by gridlock, fatal accidents and a polluted environment. The authors cannot overstate the importance of CVs in solving long-standing mobility issues and making travel safer and more convenient. It is high time to explore vehicular networks in detail to suggest solutions to the challenges encountered by these highly dynamic networks.

Design/methodology/approach

This paper compiles research on various V2X topics, from a comprehensive overview of V2X networks to their unique characteristics and challenges. In doing so, the authors identify multiple issues encountered by V2X communication networks due to their open communication nature and high mobility, especially from a security perspective. Thus, this paper proposes a trust-based model to secure vehicular networks. The proposed approach uses the communicating nodes’ behavior to establish trustworthy relationships. The proposed model only allows trusted nodes to communicate among themselves while isolating malicious nodes to achieve secure communication.

Findings

Despite the benefits offered by V2X networks, they have associated challenges. As the number of CVs on the roads increase, so does the attack surface. Connected cars provide numerous safety-critical applications that, if compromised, can result in fatal consequences. While cryptographic mechanisms effectively prevent external attacks, various studies propose trust-based models to complement cryptographic solutions for dealing with internal attacks. While numerous trust-based models have been proposed, there is room for improvement in malicious node detection and complexity. Optimizing the number of nodes considered in trust calculation can reduce the complexity of state-of-the-art solutions. The theoretical analysis of the proposed model exhibits an improvement in trust calculation, better malicious node detection and fewer computations.

Originality/value

The proposed model is the first to add another dimension to trust calculation by incorporating opinions about recommender nodes. The added dimension improves the trust calculation resulting in better performance in thwarting attacks and enhancing security while also reducing the trust calculation complexity.

Details

International Journal of Pervasive Computing and Communications, vol. 20 no. 1
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 13 March 2024

Ziyuan Ma, Huajun Gong and Xinhua Wang

The purpose of this paper is to construct an event-triggered finite-time fault-tolerant formation tracking controller, which can achieve a time-varying formation control for…

Abstract

Purpose

The purpose of this paper is to construct an event-triggered finite-time fault-tolerant formation tracking controller, which can achieve a time-varying formation control for multiple unmanned aerial vehicles (UAVs) during actuator failures and external perturbations.

Design/methodology/approach

First, this study developed the formation tracking protocol for each follower using UAV formation members, defining the tracking inaccuracy of the UAV followers’ location. Subsequently, this study designed the multilayer event-triggered controller based on the backstepping method framework within finite time. Then, considering the actuator failures, and added self-adaptive thought for fault-tolerant control within finite time, the event-triggered closed-loop system is subsequently shown to be a finite-time stable system. Furthermore, the Zeno behavior is analyzed to prevent infinite triggering instances within a finite time. Finally, simulations are conducted with external disturbances and actuator failure conditions to demonstrate formation tracking controller performance.

Findings

It achieves improved performance in the presence of external disturbances and system failures. Combining limited-time adaptive control and event triggering improves system stability, increase robustness to disturbances and calculation efficiency. In addition, the designed formation tracking controller can effectively control the time-varying formation of the leader and followers to complete the task, and by adding a fixed-time observer, it can effectively compensate for external disturbances and improve formation control accuracy.

Originality/value

A formation-following controller is designed, which can handle both external disturbances and internal actuator failures during formation flight, and the proposed method can be applied to a variety of formation control scenarios and does not rely on a specific type of UAV or communication network.

Details

Aircraft Engineering and Aerospace Technology, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1748-8842

Keywords

Article
Publication date: 15 May 2023

Mei Huang, Kexin Wang, Yue Liu and Shuangyu Xu

Effective post-disaster communication is essential for destination marketing organizations to encourage visitors following natural disasters. This research aimed to analyze the…

Abstract

Purpose

Effective post-disaster communication is essential for destination marketing organizations to encourage visitors following natural disasters. This research aimed to analyze the impact of two typical types of post-disaster communication messages – solidarity messages and testimonial messages – on post-disaster visiting intention. This research proposes effective communication strategies for post-disaster destination marketing.

Design/methodology/approach

For the case of Jiuzhai Valley, China, which experienced market recovery after two years of rebuilding following a 2017 earthquake, this study designed three contextual experiments based on post-disaster communication scenarios on the Internet and social media to test the causal chain between recovery message types and post-disaster visiting intentions. The data were analyzed using analysis of variance, independent samples t-tests, and the bootstrap method.

Findings

The results indicate that both solidarity messages and testimonial messages evoked higher visiting intention than the no-message group. However, solidarity messages (vs testimonial messages) were more effective when shared on the destination management organization's official account than when they were shared on an influencer's account, with their effects being mediated by the symbolic – as opposed to the hedonic – value of tourist behavior.

Practical implications

Destination management organizations should actively carry out marketing communication through the Internet and social media for areas that have experienced disasters. Crisis communicators should consider inviting popular social media influencers to visit the destination and share their experiences to enhance market confidence, while also paying more attention to the operation of official social media accounts.

Originality/value

This study sheds light on the use of the Internet and social media as tools for post-disaster marketing. By expanding on post-disaster communication theory, this study fills a research gap regarding the effectiveness of tourism marketing strategies after a crisis.

Details

Journal of Hospitality and Tourism Insights, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2514-9792

Keywords

Article
Publication date: 31 August 2022

Lala Hu and Mirko Olivieri

The purpose of this paper is to investigate how business-to-business (B2B) companies operating in durable goods use digital communications after the COVID-19 outbreak. In…

Abstract

Purpose

The purpose of this paper is to investigate how business-to-business (B2B) companies operating in durable goods use digital communications after the COVID-19 outbreak. In particular, this paper focuses on the objectives of these digital communication tools for the marketing strategies of B2B white goods firms.

Design/methodology/approach

As the research objective is explorative, the authors conducted a qualitative analysis by collecting 13 semi-structured interviews with B2B marketing professionals working for white goods firms in Italy. Primary data was triangulated with secondary data about the white goods industry, such as sector reports.

Findings

The findings of this paper show an acceleration in the adoption of digital communication tools among B2B firms after COVID-19. The authors also discuss the effects in the use of such tools both in the short and long term.

Originality/value

This paper attempts to contribute to the B2B marketing literature by providing an original analysis of the consequences of the COVID-19 outbreak focusing on the use of digital communication tools among white goods firms. It also provides managerial implications for firms operating in B2B.

Details

Journal of Business & Industrial Marketing, vol. 38 no. 7
Type: Research Article
ISSN: 0885-8624

Keywords

Article
Publication date: 12 February 2024

Cheryl Ann Lambert, Michele E. Ewing and Toqa Hassan

Fake news stories have become a central element of crises that corporate public relations practitioners have confronted. Whether such stories are rumors, outright lies or…

Abstract

Purpose

Fake news stories have become a central element of crises that corporate public relations practitioners have confronted. Whether such stories are rumors, outright lies or deliberate attempts to discredit corporations, they have the same impact and require specific strategies for public relations practitioners to effectively respond. The purpose of this study is to uncover strategies to manage crises that arise from fake news and if and how these strategies differ for other corporate crises.

Design/methodology/approach

In this multi-method study of 21 in-depth interviews and a 8-person focus group with senior-level corporate public relations practitioners, authors explored decision-making strategies for responding to fake news crises. Transcripts of interviews and the focus group were thematically analyzed.

Findings

Results reveal insights regarding how public relations practitioners determine if and when to respond to fake news crises in corporations; what response strategies public relations practitioners have the autonomy to employ for fake news crises in corporations, and how public relations practitioners control media narratives during fake news crises in corporations.

Practical implications

The findings guide public relations practitioners to craft an autonomous decision-making process and effective online listening strategies—establishing a watchful waiting approach—and determine if the fake news issue is a passing moment or movement swirling into a crisis.

Originality/value

Few studies have examined the perspectives of crisis communication experts about minimizing and managing fake news crises. The study identifies opportunities for future research focused on crises originating from fake news and disinformation.

Details

Journal of Communication Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1363-254X

Keywords

Article
Publication date: 14 September 2022

Mariana Namen Jatobá, Mário Franco and Margarida Rodrigues

The formation of alliances between organisations is increasingly common, allowing firms to discover and ensure competitive advantages. This research paper aims to make a critical…

Abstract

Purpose

The formation of alliances between organisations is increasingly common, allowing firms to discover and ensure competitive advantages. This research paper aims to make a critical analysis of studies to understand the role of communication between partners in the process of strategic alliances.

Design/methodology/approach

A systematic literature review was carried out, using the Web of Science database to obtain data, associating the terms “communication” and “strategic alliances”, which resulted in 240 scientific articles (published between 1993 and March 2021). After data treatment using VOSviewer software and reading of the contents, the final sample consisted of 179 articles on the subject in question.

Findings

The conceptual limits, exploratory descriptive analysis of the data and content analysis of research methods are presented, with five clusters being identified. The results show growing academic interest in studying communication associated with strategic alliances, and authors’ main interest lies in understanding the critical success factors and the relation between communication and knowledge.

Practical implications

This study corroborates understanding of the future of alliances, assuming that learning is the main objective; trust is the factor determining success or failure; technology is the aggregating tool; culture affects the relation; and communication is not an end but a means to construct consolidated, long-lasting and high-performing strategic alliances.

Originality/value

This study is innovative in strategic alliances area. The research confirms that the main factor in forming alliances, in both emerging and international markets, is the learning intention. This fact reinforces the relevance of the learning made possible by this transfer of know-how through communication. In addition, this study gives critical understanding of how the process of communication between partners in an alliance must be distinct; i.e. it must be flexible enough to adjust to the stage in the alliance’s life cycle.

Details

Journal of Business & Industrial Marketing, vol. 38 no. 7
Type: Research Article
ISSN: 0885-8624

Keywords

1 – 10 of over 6000