Search results
1 – 3 of 3Nicola Cobelli and Emanuele Blasioli
The purpose of this study is to introduce new tools to develop a more precise and focused bibliometric analysis on the field of digitalization in healthcare management…
Abstract
Purpose
The purpose of this study is to introduce new tools to develop a more precise and focused bibliometric analysis on the field of digitalization in healthcare management. Furthermore, this study aims to provide an overview of the existing resources in healthcare management and education and other developing interdisciplinary fields.
Design/methodology/approach
This work uses bibliometric analysis to conduct a comprehensive review to map the use of the unified theory of acceptance and use of technology (UTAUT) and the unified theory of acceptance and use of technology 2 (UTAUT2) research models in healthcare academic studies. Bibliometric studies are considered an important tool to evaluate research studies and to gain a comprehensive view of the state of the art.
Findings
Although UTAUT dates to 2003, our bibliometric analysis reveals that only since 2016 has the model, together with UTAUT2 (2012), had relevant application in the literature. Nonetheless, studies have shown that UTAUT and UTAUT2 are particularly suitable for understanding the reasons that underlie the adoption and non-adoption choices of eHealth services. Further, this study highlights the lack of a multidisciplinary approach in the implementation of eHealth services. Equally significant is the fact that many studies have focused on the acceptance and the adoption of eHealth services by end users, whereas very few have focused on the level of acceptance of healthcare professionals.
Originality/value
To the best of the authors’ knowledge, this is the first study to conduct a bibliometric analysis of technology acceptance and adoption by using advanced tools that were conceived specifically for this purpose. In addition, the examination was not limited to a certain era and aimed to give a worldwide overview of eHealth service acceptance and adoption.
Details
Keywords
Alice J.M. Tan, Shujuan Xiao, Katie Kaiqi Jiang and Zitong Chen
This study aims to examine the relationship between employees’ psychological contract breach and two types of voice behavior based on the social exchange theory. Additionally, the…
Abstract
Purpose
This study aims to examine the relationship between employees’ psychological contract breach and two types of voice behavior based on the social exchange theory. Additionally, the study explores the role of globally responsible business leadership in buffering the negative impacts of psychological contract breach on voice.
Design/methodology/approach
Survey data was collected from Chinese full-time employees and the final sample size is 337. Partial least squares structural equation modeling was used to test the hypotheses.
Findings
Findings indicate that psychological contract breach (PCB) has a positive and significant impact on employee aggressive voice behavior (AVB), while its relationship with constructive voice behavior (CVB) is not significant. Furthermore, globally responsible business leadership (GRBL) weakens the negative relationship between PCB and CVB, while strengthens the positive relationship between PCB and AVB.
Practical implications
The findings assist organizations in better recognizing the detrimental consequences of psychological contract breach. Second, the findings serve as a reminder to managers of the benefits of displaying globally responsible business leadership. Third, managers should recognize the complexities of globally responsible business leadership.
Originality/value
First, this study sheds new light on the impact of PCB on employees’ desirable and undesirable proactive behaviors by investigating how and when psychological contract breach affects two types of voice behavior. Second, the moderating role of GRBL further enriches our understanding of how to buffer negative effects of PCB and the desirable function of GRBL. Third, this study enriches the social exchange theory by investigating whether the leader−employee relationship will compensate for the failure of organization−employee relationship.
Details
Keywords
Preeti Godabole and Girish Bhole
The main purpose of the paper is timing analysis of mixed critical applications on the multicore system to identify an efficient task scheduling mechanism to achieve three main…
Abstract
Purpose
The main purpose of the paper is timing analysis of mixed critical applications on the multicore system to identify an efficient task scheduling mechanism to achieve three main objectives improving schedulability, achieving reliability and minimizing the number of cores used. The rise in transient faults in embedded systems due to the use of low-cost processors has led to the use of fault-tolerant scheduling and mapping techniques.
Design/methodology/approach
The paper opted for a simulation-based study. The simulation of mixed critical applications, like air traffic control systems and synthetic workloads, is carried out using a litmus-real time testbed on an Ubuntu machine. The heuristic algorithms for task allocation based on utilization factors and task criticalities are proposed for partitioned approaches with multiple objectives.
Findings
Both partitioned earliest deadline first (EDF) with the utilization-based heuristic and EDF-virtual deadline (VD) with a criticality-based heuristic for allocation works well, as it schedules the air traffic system with a 98% success ratio (SR) using only three processor cores with transient faults being handled by the active backup of the tasks. With synthetic task loads, the proposed criticality-based heuristic works well with EDF-VD, as the SR is 94%. The validation of the proposed heuristic is done with a global and partitioned approach of scheduling, considering active backups to make the system reliable. There is an improvement in SR by 11% as compared to the global approach and a 17% improvement in comparison with the partitioned fixed-priority approach with only three processor cores being used.
Research limitations/implications
The simulations of mixed critical tasks are carried out on a real-time kernel based on Linux and are generalizable in Linux-based environments.
Practical implications
The rise in transient faults in embedded systems due to the use of low-cost processors has led to the use of fault-tolerant scheduling and mapping techniques.
Originality/value
This paper fulfills an identified need to have multi-objective task scheduling in a mixed critical system. The timing analysis helps to identify performance risks and assess alternative architectures used to achieve reliability in terms of transient faults.
Details