Search results
1 – 10 of over 1000Hao Chen and Yufei Yuan
Protection motivation theory (PMT) explains that the intention to cope with information security risks is based on informed threat and coping appraisals. However, people cannot…
Abstract
Purpose
Protection motivation theory (PMT) explains that the intention to cope with information security risks is based on informed threat and coping appraisals. However, people cannot always make appropriate assessments due to possible ignorance and cognitive biases. This study proposes a research model that introduces four antecedent factors from ignorance and bias perspectives into the PMT model and empirically tests this model with data from a survey of electronic waste (e-waste) handling.
Design/methodology/approach
The data collected from 356 Chinese samples are analyzed via structural equation modeling (SEM).
Findings
The results revealed that for threat appraisal, optimistic bias leads to a lower perception of risks. However, factual ignorance (lack of knowledge of risks) does not significantly affect the perceived threat. For coping appraisal, practical ignorance (lack of knowledge of coping with risks) leads to low response efficacy and self-efficacy and high perceptions of coping cost, but the illusion of control overestimates response efficacy and self-efficacy.
Originality/value
First, this study addresses a new type of information security problem in e-waste handling. Second, this study extends the PMT model by exploring the roles of ignorance and bias as antecedents. Finally, the authors reinvestigate the basic constructs of PMT to identify how rational threat and coping assessments affect user intentions to cope with data security risks.
Details
Keywords
Sanjay Kumar, Kushal Sharma, Oluwole Daniel Makinde, Vimal Kumar Joshi and Salman Saleem
The purpose of this study is to investigate the entropy generation in different nanofluids flow over a vertically moving rotating disk. Unlike the classical Karman flow…
Abstract
Purpose
The purpose of this study is to investigate the entropy generation in different nanofluids flow over a vertically moving rotating disk. Unlike the classical Karman flow, water-based nanofluids have various suspended nanoparticles, namely, Cu, Ag, Al2O3 and TiO2, and the disk is also moving vertically with time-dependent velocity.
Design/methodology/approach
The Keller box technique numerically solves the governing equations after reduction by suitable similarity transformations. The shear stress and heat transport features, along with flow and temperature fields, are numerically computed for different concentrations of the nanoparticles.
Findings
This study is done comparatively in between different nanofluids and for the cases of vertical movement of the disk. It is found that heat transfer characteristics rely not only on considered nanofluid but also on disk movement. Moreover, the upward movement of the disk diminishes the heat-transfer characteristics of the fluid for considered nanoparticles. In addition, for the same group of nanoparticles, an entropy generation study is also performed, and an increasing trend is found for all nanoparticles, with alumina nanoparticles dominating the others.
Originality/value
This research is a novel work on a vertically moving rotating surface for the water-conveying nanoparticle fluid flow with entropy generation analysis. The results were found to be in good agreement in the case of pure fluid.
Details
Keywords
Kazuyuki Motohashi and Chen Zhu
This study aims to assess the technological capability of Chinese internet platforms (BAT: Baidu, Alibaba, Tencent) compared to US ones (GAFA: Google, Amazon, Facebook, Apple)…
Abstract
Purpose
This study aims to assess the technological capability of Chinese internet platforms (BAT: Baidu, Alibaba, Tencent) compared to US ones (GAFA: Google, Amazon, Facebook, Apple). More specifically, this study explores Baidu’s technological catching-up process with Google by analyzing their patent textual information.
Design/methodology/approach
The authors retrieved 26,383 Google patents and 6,695 Baidu patents from PATSTAT 2019 Spring version. The collected patent documents were vectorized using the Word2Vec model first, and then K-means clustering was applied to visualize the technological space of two firms. Finally, novel indicators were proposed to capture the technological catching-up process between Baidu and Google.
Findings
The results show that Baidu follows a trend of US rather than Chinese technology which suggests Baidu is aggressively seeking to catch up with US players in the process of its technological development. At the same time, the impact index of Baidu patents increases over time, reflecting its upgrading of technological competitiveness.
Originality/value
This study proposed a new method to analyze technology mapping and evolution based on patent text information. As both US and China are crucial players in the internet industry, it is vital for policymakers in third countries to understand the technological capacity and competitiveness of both countries to develop strategic partnerships effectively.
Details
Keywords
Bhanu Prakash Saripalli, Gagan Singh and Sonika Singh
Non-linear power–voltage characteristics of solar cell and frequently changing output due to variation in solar irradiance caused by movement of clouds are the major issues need…
Abstract
Purpose
Non-linear power–voltage characteristics of solar cell and frequently changing output due to variation in solar irradiance caused by movement of clouds are the major issues need to be considered in photovoltaic (PV) penetration to maintain the power quality of the grid. It is important for a PV module to always function at its maximum available power point to increase the efficiency and to maintain the grid stability. A possible solution to mitigate these generation fluctuations is the use of an electric double-layer capacitor or supercapacitor energy storage device, which is an efficient storage device for power smoothing applications. This study aims to propose a power smoothing control approach to smoothen out the output power variations of a solar PV system using a supercapacitor energy storage device.
Design/methodology/approach
To extract the maximum possible power from a PV panel, there are several maximum power points tracking (MPPT) algorithms developed in literature. Fuzzy logic controller-MPPT method is used in this work as it is a very efficient and popular technique which responds quickly under varying ecological conditions, reduced computational complexity and does not depend on any system constraints. Fuzzy logic-based MPPT controller by Boost DC–DC converter is developed for operating the PV panels at available maximum power point. Fuzzy logic-proportional integral (PI) charge controller is implemented by Buck–Boost converter to provide the constant current and suitable voltage for supercapacitor and to achieve better power smoothing. PI charge controller is preferred in this work as it offers better outcomes and is very easy to implement.
Findings
Simulation results conclude that the proposed power smoothing control approach can efficiently smooth out the power variations under variable irradiance and temperature situations. To confirm the accurateness of the proposed system, it is validated for poly-crystalline PV module and comparison of results is done by using different case study with and without the use of an energy storage system under change in irradiance condition. The proposed system is developed and examined on MATLAB/Simulink environment.
Originality/value
The performance comparison between PV power output with and without the use of a supercapacitor energy storage device under different Case Studies shows that the improved performance in smoothing of power output was achieved with the use of a supercapacitor energy storage device.
Details
Keywords
Julián Monsalve-Pulido, Jose Aguilar, Edwin Montoya and Camilo Salazar
This article proposes an architecture of an intelligent and autonomous recommendation system to be applied to any virtual learning environment, with the objective of efficiently…
Abstract
This article proposes an architecture of an intelligent and autonomous recommendation system to be applied to any virtual learning environment, with the objective of efficiently recommending digital resources. The paper presents the architectural details of the intelligent and autonomous dimensions of the recommendation system. The paper describes a hybrid recommendation model that orchestrates and manages the available information and the specific recommendation needs, in order to determine the recommendation algorithms to be used. The hybrid model allows the integration of the approaches based on collaborative filter, content or knowledge. In the architecture, information is extracted from four sources: the context, the students, the course and the digital resources, identifying variables, such as individual learning styles, socioeconomic information, connection characteristics, location, etc. Tests were carried out for the creation of an academic course, in order to analyse the intelligent and autonomous capabilities of the architecture.
Details
Keywords
Ado Adamou Abba Ari, Olga Kengni Ngangmo, Chafiq Titouna, Ousmane Thiare, Kolyang, Alidou Mohamadou and Abdelhak Mourad Gueroui
The Cloud of Things (IoT) that refers to the integration of the Cloud Computing (CC) and the Internet of Things (IoT), has dramatically changed the way treatments are done in the…
Abstract
The Cloud of Things (IoT) that refers to the integration of the Cloud Computing (CC) and the Internet of Things (IoT), has dramatically changed the way treatments are done in the ubiquitous computing world. This integration has become imperative because the important amount of data generated by IoT devices needs the CC as a storage and processing infrastructure. Unfortunately, security issues in CoT remain more critical since users and IoT devices continue to share computing as well as networking resources remotely. Moreover, preserving data privacy in such an environment is also a critical concern. Therefore, the CoT is continuously growing up security and privacy issues. This paper focused on security and privacy considerations by analyzing some potential challenges and risks that need to be resolved. To achieve that, the CoT architecture and existing applications have been investigated. Furthermore, a number of security as well as privacy concerns and issues as well as open challenges, are discussed in this work.
Details
Keywords
Dong Li, Yu Zhou, Zhan-Wei Cao, Xin Chen and Jia-Peng Dai
This paper aims to establish a lattice Boltzmann (LB) method for solid-liquid phase transition (SLPT) from the pore scale to the representative elementary volume (REV) scale. By…
Abstract
Purpose
This paper aims to establish a lattice Boltzmann (LB) method for solid-liquid phase transition (SLPT) from the pore scale to the representative elementary volume (REV) scale. By applying this method, detailed information about heat transfer and phase change processes within the pores can be obtained, while also enabling the calculation of larger-scale SLPT problems, such as shell-and-tube phase change heat storage systems.
Design/methodology/approach
Three-dimensional (3D) pore-scale enthalpy-based LB model is developed. The computational input parameters at the REV scale are derived from calculations at the pore scale, ensuring consistency between the two scales. The approaches to reconstruct the 3D porous structure and determine the REV of metal foam were discussed. The implementation of conjugate heat transfer between the solid matrix and the solid−liquid phase change material (SLPCM) for the proposed model is developed. A simple REV-scale LB model under the local thermal nonequilibrium condition is presented. The method of bridging the gap between the pore-scale and REV-scale enthalpy-based LB models by the REV is given.
Findings
This coupled method facilitates detailed simulations of flow, heat transfer and phase change within pores. The approach holds promise for multiscale calculations in latent heat storage devices with porous structures. The SLPT of the heat sinks for electronic device thermal control was simulated as a case, demonstrating the efficiency of the present models in designing and optimizing SLPT devices.
Originality/value
A coupled pore-scale and REV-scale LB method as a numerical tool for investigating phase change in porous materials was developed. This innovative approach allows for the capture of details within pores while addressing computations over a large domain. The LB method for simulating SLPT from the pore scale to the REV scale was given. The proposed method addresses the conjugate heat transfer between the SLPCM and the solid matrix in the enthalpy-based LB model.
Details
Keywords
Beatrice Arthur and Thomas van der Walt
The purpose of this study is to investigate the current research data management practices among researchers in Ghana and their impact on data reuse and collaborative research…
Abstract
Purpose
The purpose of this study is to investigate the current research data management practices among researchers in Ghana and their impact on data reuse and collaborative research. The study aims to identify the methods used by researchers to store and preserve their research data, as well as to determine the extent to which researchers share their data with others.
Design/methodology/approach
The study uses a mixed-method research strategy to blend qualitative and quantitative data and is conducted at two public and two private universities in Ghana.
Findings
The study revealed that researchers in Ghana currently store and preserve their research data using personal devices, such as laptops, CDs and external flash drives, rather than keeping the data in university data repositories. They also do not share their research data with others, which negatively affects collaborative research. The current practice of storing data on personal devices and not sharing data with others hinders collaborative research. The study recommends that universities in Ghana revise their research policy documents to address RDM-related issues such as data storage, data preservation, data sharing and data reuse.
Research limitations/implications
The study was conducted at two public and two private universities in Ghana, but the findings were placed in a wider context through appropriate references.
Practical implications
This study emphasises the need for sound research data management procedures to support research collaboration and data reuse in Ghana. Universities should provide incentives to academics to disclose their data to encourage data sharing and collaboration.
Social implications
The government and management of universities should consciously invest in the needed technologies and equipment to implement research data management in their universities.
Originality/value
This study looks at how researchers in Ghana manage their research data and how it affects data reuse and collaborative research.
Details
Keywords
Tulsi Pawan Fowdur and Ashven Sanghan
Energy production and distribution is undergoing a revolutionary transition with the advent of disruptive technologies such as the Internet of Energy (IoE), 5G and artificial…
Abstract
Energy production and distribution is undergoing a revolutionary transition with the advent of disruptive technologies such as the Internet of Energy (IoE), 5G and artificial intelligence (AI). IoE essentially involves automating and enhancing the energy infrastructure: the power grid from grid operators to energy generators and distribution utilities. The IoE also relies on powerful connectivity networks such as 5G, big data analytics and AI to optimise its operation. By incorporating the technology that employs ubiquitous devices such as smartphones, tablets or smart electric vehicles, it will be possible to fully exploit the potential of IoE using 5G networks. 5G networks will provide high speed connections between devices such as drones, tractors and cloud networks, to transfer huge amounts of sensor data. Additionally, there are many sources of isolated data across the main energy production units (generation, transmission and distribution), and the data is increasing at phenomenal rates. By applying AI to these data, major improvements can be brought at each stage of the energy production chain. Tying renewable energy to the telecommunications sector and leveraging on the potential of data analytics is something which is gaining major attention among researchers and industry experts. This chapter therefore explores the combination of three of the most promising technologies i.e. IoE, 5G and AI for achieving affordable and clean energy, which is SDG 7 in the UN Sustainable Development Goals (SDGs).
Details
Keywords
Hamid Reza Nikkhah, Varun Grover and Rajiv Sabherwal
This study aims to argue that user’s continued use behavior is contingent upon two perceptions (i.e. the app and the provider). This study examines the moderating effects of…
Abstract
Purpose
This study aims to argue that user’s continued use behavior is contingent upon two perceptions (i.e. the app and the provider). This study examines the moderating effects of user’s perceptions of apps and providers on the effects of security and privacy concerns and investigate whether assurance mechanisms decrease such concerns.
Design/methodology/approach
This study conducts a scenario-based survey with 694 mobile cloud computing (MCC) app users to understand their perceptions and behaviors.
Findings
This study finds that while perceived value of data transfer to the cloud moderates the effects of security and privacy concerns on continued use behavior, trust only moderates the effect of privacy concerns. This study also finds that perceived effectiveness of security and privacy intervention impacts privacy concerns but does not decrease security concerns.
Originality/value
Prior mobile app studies mainly focused on mobile apps and did not investigate the perceptions of app providers along with app features in the same study. Furthermore, International Organization for Standardization 27018 certification and privacy policy notification are the interventions that exhibit data assurance mechanisms. However, it is unknown whether these interventions are able to decrease users’ security and privacy concerns after using MCC apps.
Details