Search results

1 – 10 of over 1000
Article
Publication date: 30 December 2022

Hao Chen and Yufei Yuan

Protection motivation theory (PMT) explains that the intention to cope with information security risks is based on informed threat and coping appraisals. However, people cannot…

Abstract

Purpose

Protection motivation theory (PMT) explains that the intention to cope with information security risks is based on informed threat and coping appraisals. However, people cannot always make appropriate assessments due to possible ignorance and cognitive biases. This study proposes a research model that introduces four antecedent factors from ignorance and bias perspectives into the PMT model and empirically tests this model with data from a survey of electronic waste (e-waste) handling.

Design/methodology/approach

The data collected from 356 Chinese samples are analyzed via structural equation modeling (SEM).

Findings

The results revealed that for threat appraisal, optimistic bias leads to a lower perception of risks. However, factual ignorance (lack of knowledge of risks) does not significantly affect the perceived threat. For coping appraisal, practical ignorance (lack of knowledge of coping with risks) leads to low response efficacy and self-efficacy and high perceptions of coping cost, but the illusion of control overestimates response efficacy and self-efficacy.

Originality/value

First, this study addresses a new type of information security problem in e-waste handling. Second, this study extends the PMT model by exploring the roles of ignorance and bias as antecedents. Finally, the authors reinvestigate the basic constructs of PMT to identify how rational threat and coping assessments affect user intentions to cope with data security risks.

Article
Publication date: 1 November 2023

Sanjay Kumar, Kushal Sharma, Oluwole Daniel Makinde, Vimal Kumar Joshi and Salman Saleem

The purpose of this study is to investigate the entropy generation in different nanofluids flow over a vertically moving rotating disk. Unlike the classical Karman flow…

Abstract

Purpose

The purpose of this study is to investigate the entropy generation in different nanofluids flow over a vertically moving rotating disk. Unlike the classical Karman flow, water-based nanofluids have various suspended nanoparticles, namely, Cu, Ag, Al2O3 and TiO2, and the disk is also moving vertically with time-dependent velocity.

Design/methodology/approach

The Keller box technique numerically solves the governing equations after reduction by suitable similarity transformations. The shear stress and heat transport features, along with flow and temperature fields, are numerically computed for different concentrations of the nanoparticles.

Findings

This study is done comparatively in between different nanofluids and for the cases of vertical movement of the disk. It is found that heat transfer characteristics rely not only on considered nanofluid but also on disk movement. Moreover, the upward movement of the disk diminishes the heat-transfer characteristics of the fluid for considered nanoparticles. In addition, for the same group of nanoparticles, an entropy generation study is also performed, and an increasing trend is found for all nanoparticles, with alumina nanoparticles dominating the others.

Originality/value

This research is a novel work on a vertically moving rotating surface for the water-conveying nanoparticle fluid flow with entropy generation analysis. The results were found to be in good agreement in the case of pure fluid.

Details

International Journal of Numerical Methods for Heat & Fluid Flow, vol. 34 no. 2
Type: Research Article
ISSN: 0961-5539

Keywords

Open Access
Article
Publication date: 9 January 2024

Kazuyuki Motohashi and Chen Zhu

This study aims to assess the technological capability of Chinese internet platforms (BAT: Baidu, Alibaba, Tencent) compared to US ones (GAFA: Google, Amazon, Facebook, Apple)…

Abstract

Purpose

This study aims to assess the technological capability of Chinese internet platforms (BAT: Baidu, Alibaba, Tencent) compared to US ones (GAFA: Google, Amazon, Facebook, Apple). More specifically, this study explores Baidu’s technological catching-up process with Google by analyzing their patent textual information.

Design/methodology/approach

The authors retrieved 26,383 Google patents and 6,695 Baidu patents from PATSTAT 2019 Spring version. The collected patent documents were vectorized using the Word2Vec model first, and then K-means clustering was applied to visualize the technological space of two firms. Finally, novel indicators were proposed to capture the technological catching-up process between Baidu and Google.

Findings

The results show that Baidu follows a trend of US rather than Chinese technology which suggests Baidu is aggressively seeking to catch up with US players in the process of its technological development. At the same time, the impact index of Baidu patents increases over time, reflecting its upgrading of technological competitiveness.

Originality/value

This study proposed a new method to analyze technology mapping and evolution based on patent text information. As both US and China are crucial players in the internet industry, it is vital for policymakers in third countries to understand the technological capacity and competitiveness of both countries to develop strategic partnerships effectively.

Details

Asia Pacific Journal of Innovation and Entrepreneurship, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2071-1395

Keywords

Article
Publication date: 8 April 2022

Bhanu Prakash Saripalli, Gagan Singh and Sonika Singh

Non-linear power–voltage characteristics of solar cell and frequently changing output due to variation in solar irradiance caused by movement of clouds are the major issues need…

Abstract

Purpose

Non-linear power–voltage characteristics of solar cell and frequently changing output due to variation in solar irradiance caused by movement of clouds are the major issues need to be considered in photovoltaic (PV) penetration to maintain the power quality of the grid. It is important for a PV module to always function at its maximum available power point to increase the efficiency and to maintain the grid stability. A possible solution to mitigate these generation fluctuations is the use of an electric double-layer capacitor or supercapacitor energy storage device, which is an efficient storage device for power smoothing applications. This study aims to propose a power smoothing control approach to smoothen out the output power variations of a solar PV system using a supercapacitor energy storage device.

Design/methodology/approach

To extract the maximum possible power from a PV panel, there are several maximum power points tracking (MPPT) algorithms developed in literature. Fuzzy logic controller-MPPT method is used in this work as it is a very efficient and popular technique which responds quickly under varying ecological conditions, reduced computational complexity and does not depend on any system constraints. Fuzzy logic-based MPPT controller by Boost DC–DC converter is developed for operating the PV panels at available maximum power point. Fuzzy logic-proportional integral (PI) charge controller is implemented by Buck–Boost converter to provide the constant current and suitable voltage for supercapacitor and to achieve better power smoothing. PI charge controller is preferred in this work as it offers better outcomes and is very easy to implement.

Findings

Simulation results conclude that the proposed power smoothing control approach can efficiently smooth out the power variations under variable irradiance and temperature situations. To confirm the accurateness of the proposed system, it is validated for poly-crystalline PV module and comparison of results is done by using different case study with and without the use of an energy storage system under change in irradiance condition. The proposed system is developed and examined on MATLAB/Simulink environment.

Originality/value

The performance comparison between PV power output with and without the use of a supercapacitor energy storage device under different Case Studies shows that the improved performance in smoothing of power output was achieved with the use of a supercapacitor energy storage device.

Open Access
Article
Publication date: 28 July 2020

Julián Monsalve-Pulido, Jose Aguilar, Edwin Montoya and Camilo Salazar

This article proposes an architecture of an intelligent and autonomous recommendation system to be applied to any virtual learning environment, with the objective of efficiently…

1930

Abstract

This article proposes an architecture of an intelligent and autonomous recommendation system to be applied to any virtual learning environment, with the objective of efficiently recommending digital resources. The paper presents the architectural details of the intelligent and autonomous dimensions of the recommendation system. The paper describes a hybrid recommendation model that orchestrates and manages the available information and the specific recommendation needs, in order to determine the recommendation algorithms to be used. The hybrid model allows the integration of the approaches based on collaborative filter, content or knowledge. In the architecture, information is extracted from four sources: the context, the students, the course and the digital resources, identifying variables, such as individual learning styles, socioeconomic information, connection characteristics, location, etc. Tests were carried out for the creation of an academic course, in order to analyse the intelligent and autonomous capabilities of the architecture.

Details

Applied Computing and Informatics, vol. 20 no. 1/2
Type: Research Article
ISSN: 2634-1964

Keywords

Open Access
Article
Publication date: 31 July 2020

Ado Adamou Abba Ari, Olga Kengni Ngangmo, Chafiq Titouna, Ousmane Thiare, Kolyang, Alidou Mohamadou and Abdelhak Mourad Gueroui

The Cloud of Things (IoT) that refers to the integration of the Cloud Computing (CC) and the Internet of Things (IoT), has dramatically changed the way treatments are done in the…

6377

Abstract

The Cloud of Things (IoT) that refers to the integration of the Cloud Computing (CC) and the Internet of Things (IoT), has dramatically changed the way treatments are done in the ubiquitous computing world. This integration has become imperative because the important amount of data generated by IoT devices needs the CC as a storage and processing infrastructure. Unfortunately, security issues in CoT remain more critical since users and IoT devices continue to share computing as well as networking resources remotely. Moreover, preserving data privacy in such an environment is also a critical concern. Therefore, the CoT is continuously growing up security and privacy issues. This paper focused on security and privacy considerations by analyzing some potential challenges and risks that need to be resolved. To achieve that, the CoT architecture and existing applications have been investigated. Furthermore, a number of security as well as privacy concerns and issues as well as open challenges, are discussed in this work.

Details

Applied Computing and Informatics, vol. 20 no. 1/2
Type: Research Article
ISSN: 2634-1964

Keywords

Article
Publication date: 4 April 2024

Dong Li, Yu Zhou, Zhan-Wei Cao, Xin Chen and Jia-Peng Dai

This paper aims to establish a lattice Boltzmann (LB) method for solid-liquid phase transition (SLPT) from the pore scale to the representative elementary volume (REV) scale. By…

Abstract

Purpose

This paper aims to establish a lattice Boltzmann (LB) method for solid-liquid phase transition (SLPT) from the pore scale to the representative elementary volume (REV) scale. By applying this method, detailed information about heat transfer and phase change processes within the pores can be obtained, while also enabling the calculation of larger-scale SLPT problems, such as shell-and-tube phase change heat storage systems.

Design/methodology/approach

Three-dimensional (3D) pore-scale enthalpy-based LB model is developed. The computational input parameters at the REV scale are derived from calculations at the pore scale, ensuring consistency between the two scales. The approaches to reconstruct the 3D porous structure and determine the REV of metal foam were discussed. The implementation of conjugate heat transfer between the solid matrix and the solid−liquid phase change material (SLPCM) for the proposed model is developed. A simple REV-scale LB model under the local thermal nonequilibrium condition is presented. The method of bridging the gap between the pore-scale and REV-scale enthalpy-based LB models by the REV is given.

Findings

This coupled method facilitates detailed simulations of flow, heat transfer and phase change within pores. The approach holds promise for multiscale calculations in latent heat storage devices with porous structures. The SLPT of the heat sinks for electronic device thermal control was simulated as a case, demonstrating the efficiency of the present models in designing and optimizing SLPT devices.

Originality/value

A coupled pore-scale and REV-scale LB method as a numerical tool for investigating phase change in porous materials was developed. This innovative approach allows for the capture of details within pores while addressing computations over a large domain. The LB method for simulating SLPT from the pore scale to the REV scale was given. The proposed method addresses the conjugate heat transfer between the SLPCM and the solid matrix in the enthalpy-based LB model.

Details

International Journal of Numerical Methods for Heat & Fluid Flow, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0961-5539

Keywords

Article
Publication date: 15 March 2024

Beatrice Arthur and Thomas van der Walt

The purpose of this study is to investigate the current research data management practices among researchers in Ghana and their impact on data reuse and collaborative research…

Abstract

Purpose

The purpose of this study is to investigate the current research data management practices among researchers in Ghana and their impact on data reuse and collaborative research. The study aims to identify the methods used by researchers to store and preserve their research data, as well as to determine the extent to which researchers share their data with others.

Design/methodology/approach

The study uses a mixed-method research strategy to blend qualitative and quantitative data and is conducted at two public and two private universities in Ghana.

Findings

The study revealed that researchers in Ghana currently store and preserve their research data using personal devices, such as laptops, CDs and external flash drives, rather than keeping the data in university data repositories. They also do not share their research data with others, which negatively affects collaborative research. The current practice of storing data on personal devices and not sharing data with others hinders collaborative research. The study recommends that universities in Ghana revise their research policy documents to address RDM-related issues such as data storage, data preservation, data sharing and data reuse.

Research limitations/implications

The study was conducted at two public and two private universities in Ghana, but the findings were placed in a wider context through appropriate references.

Practical implications

This study emphasises the need for sound research data management procedures to support research collaboration and data reuse in Ghana. Universities should provide incentives to academics to disclose their data to encourage data sharing and collaboration.

Social implications

The government and management of universities should consciously invest in the needed technologies and equipment to implement research data management in their universities.

Originality/value

This study looks at how researchers in Ghana manage their research data and how it affects data reuse and collaborative research.

Details

Library Management, vol. 45 no. 3/4
Type: Research Article
ISSN: 0143-5124

Keywords

Book part
Publication date: 18 January 2024

Tulsi Pawan Fowdur and Ashven Sanghan

Energy production and distribution is undergoing a revolutionary transition with the advent of disruptive technologies such as the Internet of Energy (IoE), 5G and artificial…

Abstract

Energy production and distribution is undergoing a revolutionary transition with the advent of disruptive technologies such as the Internet of Energy (IoE), 5G and artificial intelligence (AI). IoE essentially involves automating and enhancing the energy infrastructure: the power grid from grid operators to energy generators and distribution utilities. The IoE also relies on powerful connectivity networks such as 5G, big data analytics and AI to optimise its operation. By incorporating the technology that employs ubiquitous devices such as smartphones, tablets or smart electric vehicles, it will be possible to fully exploit the potential of IoE using 5G networks. 5G networks will provide high speed connections between devices such as drones, tractors and cloud networks, to transfer huge amounts of sensor data. Additionally, there are many sources of isolated data across the main energy production units (generation, transmission and distribution), and the data is increasing at phenomenal rates. By applying AI to these data, major improvements can be brought at each stage of the energy production chain. Tying renewable energy to the telecommunications sector and leveraging on the potential of data analytics is something which is gaining major attention among researchers and industry experts. This chapter therefore explores the combination of three of the most promising technologies i.e. IoE, 5G and AI for achieving affordable and clean energy, which is SDG 7 in the UN Sustainable Development Goals (SDGs).

Details

Artificial Intelligence, Engineering Systems and Sustainable Development
Type: Book
ISBN: 978-1-83753-540-8

Keywords

Article
Publication date: 19 July 2023

Hamid Reza Nikkhah, Varun Grover and Rajiv Sabherwal

This study aims to argue that user’s continued use behavior is contingent upon two perceptions (i.e. the app and the provider). This study examines the moderating effects of…

Abstract

Purpose

This study aims to argue that user’s continued use behavior is contingent upon two perceptions (i.e. the app and the provider). This study examines the moderating effects of user’s perceptions of apps and providers on the effects of security and privacy concerns and investigate whether assurance mechanisms decrease such concerns.

Design/methodology/approach

This study conducts a scenario-based survey with 694 mobile cloud computing (MCC) app users to understand their perceptions and behaviors.

Findings

This study finds that while perceived value of data transfer to the cloud moderates the effects of security and privacy concerns on continued use behavior, trust only moderates the effect of privacy concerns. This study also finds that perceived effectiveness of security and privacy intervention impacts privacy concerns but does not decrease security concerns.

Originality/value

Prior mobile app studies mainly focused on mobile apps and did not investigate the perceptions of app providers along with app features in the same study. Furthermore, International Organization for Standardization 27018 certification and privacy policy notification are the interventions that exhibit data assurance mechanisms. However, it is unknown whether these interventions are able to decrease users’ security and privacy concerns after using MCC apps.

Details

Information & Computer Security, vol. 32 no. 1
Type: Research Article
ISSN: 2056-4961

Keywords

1 – 10 of over 1000