Search results

1 – 10 of 333
Article
Publication date: 16 January 2023

Faisal Lone, Harsh Kumar Verma and Krishna Pal Sharma

The purpose of this study is to extensively explore the vehicular network paradigm, challenges faced by them and provide a reasonable solution for securing these vulnerable…

Abstract

Purpose

The purpose of this study is to extensively explore the vehicular network paradigm, challenges faced by them and provide a reasonable solution for securing these vulnerable networks. Vehicle-to-everything (V2X) communication has brought the long-anticipated goal of safe, convenient and sustainable transportation closer to reality. The connected vehicle (CV) paradigm is critical to the intelligent transportation systems vision. It imagines a society free of a troublesome transportation system burdened by gridlock, fatal accidents and a polluted environment. The authors cannot overstate the importance of CVs in solving long-standing mobility issues and making travel safer and more convenient. It is high time to explore vehicular networks in detail to suggest solutions to the challenges encountered by these highly dynamic networks.

Design/methodology/approach

This paper compiles research on various V2X topics, from a comprehensive overview of V2X networks to their unique characteristics and challenges. In doing so, the authors identify multiple issues encountered by V2X communication networks due to their open communication nature and high mobility, especially from a security perspective. Thus, this paper proposes a trust-based model to secure vehicular networks. The proposed approach uses the communicating nodes’ behavior to establish trustworthy relationships. The proposed model only allows trusted nodes to communicate among themselves while isolating malicious nodes to achieve secure communication.

Findings

Despite the benefits offered by V2X networks, they have associated challenges. As the number of CVs on the roads increase, so does the attack surface. Connected cars provide numerous safety-critical applications that, if compromised, can result in fatal consequences. While cryptographic mechanisms effectively prevent external attacks, various studies propose trust-based models to complement cryptographic solutions for dealing with internal attacks. While numerous trust-based models have been proposed, there is room for improvement in malicious node detection and complexity. Optimizing the number of nodes considered in trust calculation can reduce the complexity of state-of-the-art solutions. The theoretical analysis of the proposed model exhibits an improvement in trust calculation, better malicious node detection and fewer computations.

Originality/value

The proposed model is the first to add another dimension to trust calculation by incorporating opinions about recommender nodes. The added dimension improves the trust calculation resulting in better performance in thwarting attacks and enhancing security while also reducing the trust calculation complexity.

Details

International Journal of Pervasive Computing and Communications, vol. 20 no. 1
Type: Research Article
ISSN: 1742-7371

Keywords

Open Access
Article
Publication date: 12 December 2023

Jayesh Prakash Gupta, Hongxiu Li, Hannu Kärkkäinen and Raghava Rao Mukkamala

In this study, the authors sought to investigate how the implicit social ties of both project owners and potential backers are associated with crowdfunding project success.

Abstract

Purpose

In this study, the authors sought to investigate how the implicit social ties of both project owners and potential backers are associated with crowdfunding project success.

Design/methodology/approach

Drawing on social ties theory and factors that affect crowdfunding success, in this research, the authors developed a model to study how project owners' and potential backers' implicit social ties are associated with crowdfunding projects' degrees of success. The proposed model was empirically tested with crowdfunding data collected from Kickstarter and social media data collected from Twitter. The authors performed the test using an ordinary least squares (OLS) regression model with fixed effects.

Findings

The authors found that project owners' implicit social ties (specifically, their social media activities, degree centrality and betweenness centrality) are significantly and positively associated with crowdfunding projects' degrees of success. Meanwhile, potential project backers' implicit social ties (their social media activities and degree centrality) are negatively associated with crowdfunding projects' degrees of success. The authors also found that project size moderates the effects of project owners' social media activities on projects' degrees of success.

Originality/value

This work contributes to the literature on crowdfunding by investigating how the implicit social ties of both potential backers and project owners on social media are associated with crowdfunding project success. This study extends the previous research on social ties' roles in explaining crowdfunding project success by including implicit social ties, while the literature explored only explicit social ties.

Details

Internet Research, vol. 34 no. 7
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 3 April 2024

Lili Gao, Xicheng Zhang, Xiaopeng Deng, Na Zhang and Ying Lu

This study aims to investigate the relationship between individual-level psychological resources and team resilience in the context of expatriate project management teams. It…

Abstract

Purpose

This study aims to investigate the relationship between individual-level psychological resources and team resilience in the context of expatriate project management teams. It seeks to understand how personal psychological resources contribute to team resilience and explore the dynamic evolution mechanism of team resilience. The goal is to enhance team resilience among expatriates in a BANI (Brittle, Anxious, Nonlinear, and Incomprehensible) world, where organizations face volatile and uncertain conditions.

Design/methodology/approach

An online survey was applied for data collection, and 315 valid samples from Chinese expatriates in international construction projects were utilized for data analysis. A structural equation model (SEM) examines the relationships between personal psychological resources and team resilience. The study identifies five psychological factors influencing team resilience: Employee Resilience, Cross-cultural Adjustment, Self-efficacy, Social Support, and Team Climate. The hypothesized relationships are validated through the SEM analysis. Additionally, a fuzzy cognitive map (FCM) is constructed to explore the dynamic mechanism of team resilience formation based on the results of the SEM.

Findings

The SEM analysis confirms that employee resilience, cross-cultural adjustment, and team climate positively impact team resilience. Social support and self-efficacy also have positive effects on team climate. Moreover, team climate is found to fully mediate the relationship between self-efficacy and team resilience, as well as between social support and team resilience. The FCM model provides further insights into the dynamic evolution of team resilience, highlighting the varying impact effects of antecedents during the team resilience development process and the effectiveness of different combinations of intervention strategies.

Originality/value

This study contributes to understanding team resilience by identifying the psychological factors influencing team resilience in expatriate project management teams. The findings emphasize the importance of social support and team climate in promoting team resilience. Interventions targeting team climate are found to facilitate the rapid development of team resilience. In contrast, interventions for social support are necessary for sustainable, long-term high levels of team resilience. Based on the dynamic simulation results, strategies for cultivating team resilience through external intervention and internal adjustment are proposed, focusing on social support and team climate. Implementing these strategies can enhance project management team resilience and improve the core competitiveness of contractors in the BANI era.

Details

Engineering, Construction and Architectural Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0969-9988

Keywords

Article
Publication date: 28 February 2023

Huasi Xu, Yidi Liu, Bingqing Song, Xueyan Yin and Xin Li

Drawing on social network and information diffusion theories, the authors study the impact of the structural characteristics of a seller’s local social network on her promotion…

Abstract

Purpose

Drawing on social network and information diffusion theories, the authors study the impact of the structural characteristics of a seller’s local social network on her promotion effectiveness in social commerce.

Design/methodology/approach

The authors define a local social network as one formed by a focal seller, her directly connected users and all links among these users. Using data from a large social commerce website in China, the authors build econometric models to investigate how the density, grouping and centralization of local social networks affect the number of likes received by products posted by sellers.

Findings

Local social networks with low density, grouping and centralization are associated with more likes on sellers’ posted products. The negative effects of grouping and centralization are reduced when density is high.

Originality/value

The paper deepens the understanding of the determinants of social commerce success from a network structure perspective. In particular, it draws attention to the role of sellers’ local social networks, forming a foundation for future research on social commerce.

Details

Information Technology & People, vol. 37 no. 2
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 26 September 2023

Hanvedes Daovisan, Sayamol Charoenratana and Motoki Akitsu

Transnational migration is a key challenge in migrant-sending and host-receiving countries. However, relatively little is known about how migrants use network capital to foster…

Abstract

Purpose

Transnational migration is a key challenge in migrant-sending and host-receiving countries. However, relatively little is known about how migrants use network capital to foster small and medium-sized enterprises (SMEs) in the ASEAN Economic Community (AEC). Therefore, the purpose of this study is to explore how network capital fosters Laotian migrant workers in Thai family SMEs.

Design/methodology/approach

This research was conducted using qualitative network analysis (QNA). Referral snowball sampling was used to draw 20 participants from December 2021 to March 2022. Data analysis was performed using Gephi, a software package developed for QNA (coding, network features, measure nodes and network metrics).

Findings

The main findings are the following four emerging themes: chain networks, social networks, human networks and financial networks are associated with network capital for fostering Laotian migrant workers in Thai family SMEs.

Originality/value

To the best of the authors’ knowledge, this study is the first QNA to explore how Laotian migrant workers use network capital in Thai family SMEs.

Details

Journal of Asia Business Studies, vol. 18 no. 1
Type: Research Article
ISSN: 1558-7894

Keywords

Article
Publication date: 21 July 2023

Serap Ergün

The purpose of this study is to propose a decentralized multi-party cross-trading scheme based on a certificate transaction mechanism for the transaction of excess consumption…

Abstract

Purpose

The purpose of this study is to propose a decentralized multi-party cross-trading scheme based on a certificate transaction mechanism for the transaction of excess consumption certificates (ECCs) of renewable energy. The aim is to address the problems associated with the existing centralized transaction mode and to promote the development of the green electricity industry.

Design/methodology/approach

The proposed scheme involves calculating the quotation difference for the same type of certificate transaction based on the quotations of all users of both buyers and sellers. The transaction volume is then determined based on the order of quotation difference from large to small, and the total interests of cooperation are calculated. The nucleolus method is adopted to allocate the total interests to each member of the alliance and calculate the final transaction price. The blockchain technology is used for the transaction to achieve accurate traceability and efficient supervision, and a corresponding smart contract is designed and simulated in the Ethereum consortium chain.

Findings

The results of the simulation show the rationality and effectiveness of the proposed scheme. The decentralized multi-party cross-trading scheme can overcome the problems associated with the existing centralized transaction mode, such as low transaction efficiency, difficulty in obtaining the optimal transaction strategy and efficient supervision. The proposed scheme can promote the development of the green electricity industry by stimulating users' demand potential for green electricity.

Originality/value

The proposed scheme is original in its use of a certificate transaction mechanism to facilitate the trading of ECCs of renewable energy. The scheme adopts a decentralized multi-party cross-trading approach that overcomes the problems associated with the existing centralized transaction mode. The use of the nucleolus method for the allocation of total interests to each member of the alliance is also original. Finally, the use of blockchain technology for accurate traceability and efficient supervision of the transaction is an original contribution to the field.

Article
Publication date: 9 August 2022

Heshu Huang, Jiping Zhang, Ji Yan, Yu Gong and Liukai Wang

The purpose of this research is to investigate the R&D investment (RDI) of manufacturing firms from the perspective of supply chain network, especially the effect of firms' supply…

Abstract

Purpose

The purpose of this research is to investigate the R&D investment (RDI) of manufacturing firms from the perspective of supply chain network, especially the effect of firms' supply chain network structures (network power and network cohesion) on its RDI, and further to explore the contingency conditions of this effect within the context of Chinese manufacturing supply chains.

Design/methodology/approach

The authors collect a large sample of Chinese manufacturing firms over the period 2014–2019 and construct a large-scale supply chain network, and finally obtain 2,390 firms from 20,483 observations. Ordinary least squares regression was adopted to analyse how supply chain network structures affect RDI in manufacturing firms.

Findings

It is surprising that firm's supply chain network structures have a negative effect on RDI. In addition, knowledge and technology intensity (KTI) positively moderate the relationship between network cohesion and RDI.

Originality/value

This study contributes to the innovation stream from the perspectives of supply chain network, and provides the empirical findings that the negative role of a firm's supply chain network structure on its RDI for the first time. The rationale for these negative effects is straightforward according to the social capital theory that manufacturing firms with a high level of social capital that are possibly to accept established patterns of thinking and behaviour, causing them to decrease the enthusiasm of RDI.

Details

European Journal of Innovation Management, vol. 27 no. 2
Type: Research Article
ISSN: 1460-1060

Keywords

Book part
Publication date: 19 March 2024

Juliana Maria Trammel, Laura Robinson and Lloyd Levine

This chapter seeks to understand the intersection between eGovernment, social media, and digital inequalities by examining the disparate flow of information during the COVID-19…

Abstract

This chapter seeks to understand the intersection between eGovernment, social media, and digital inequalities by examining the disparate flow of information during the COVID-19 pandemic. Developed economies are increasingly transitioning to digital interfaces for information dissemination and provision of services. The authors explore the potential of, and challenges facing eGovernment by looking at the use of social media during the COVID-19 pandemic. This chapter employs a case study approach to probe the dynamics of government-initiated efforts at information dissemination through the Center for Disease Control and Prevention’s (CDC) website and social media account on Twitter. The analysis in this chapter uses NodeXL to examine communication roles played by government and non-governmental actors within this slice of the Twittersphere centered around CDC@gov. As the findings demonstrate, non-governmental actors played key roles in the dissemination of public health messaging. The authors analyze these data with an eye to the potential of social media for public health communication and extrapolate that understanding to the use of digital access and social media for the provision of accurate, official information in other circumstances. While the COVID-19 pandemic was a global health crisis, individuals and households face individual or local crises every day. This angle of vision allows the chapter to conclude with recommendations pertaining to government-led information dissemination for the public good during crisis and non-crisis situations alike. In the concluding section, the authors probe the degree to which eGovernment can also address digital inequalities including connectivity, device, and literacy gaps. The authors offer solutions needed for eGovernment initiatives in light of challenges posed by digital inequalities to ensure that digital information sharing and services are accessible to all.

Details

Technology vs. Government: The Irresistible Force Meets the Immovable Object
Type: Book
ISBN: 978-1-83867-951-4

Keywords

Article
Publication date: 19 April 2024

Tarek Taha Kandil

This study aims to develop the alleviating bullwhip effects framework (ABEF) replenishment rules, and bullwhip, inventory fluctuations and customer service fulfilment rates were…

Abstract

Purpose

This study aims to develop the alleviating bullwhip effects framework (ABEF) replenishment rules, and bullwhip, inventory fluctuations and customer service fulfilment rates were examined. In addition, automated smoothing and replenishment rules can alleviate supply chain bullwhip effects. This study aims to understand the current artificial intelligence (AI) implementation practice in alleviating bullwhip effects in supply chain management. This study aimed to develop a system for writing reviews using a systematic approach.

Design/methodology/approach

The methodology for the present study consists of three parts: Part 1 deals with the systematic review process. In Part 2, the study applies social network analysis (SNA) to the fourth phase of the systematic review process. In Part 3, the author discusses developing research clusters to analyse the research state more granularly. Systematic literature reviews synthesize scientific evidence through repeatable, transparent and rigorous procedures. By using this approach, you can better interpret and understand the data. The author used two databases (EBSCO and World of Science) for unbiased analysis. In addition, systematic reviews follow preferred reporting items for systematic reviews and meta-analyses.

Findings

The study uses UCINET6 software to analyse the data. The study found that specific topics received high centrality (more attention) from scholars when it came to the study topic. Contrary to this, others experienced low centrality scores when using NETDRAW visualization graphs and dynamic capability clusters. Comprehensive analyses are used for the study’s comparison of clusters.

Research limitations/implications

This study used a journal publication as the only source of information. Peer-reviewed journal papers were eliminated for their lack of rigorousness in evaluating the state of practice. This paper discusses the bullwhip effect of digital technology on supply chain management. Considering the increasing use of “AI” in their publications, other publications dealing with sensor integration could also have been excluded. To discuss the top five and bottom five topics, the author used magazines and tables.

Practical implications

The study explores the practical implications of smoothing the bullwhip effect through AI systems, collaboration, leadership and digital skills. Artificial intelligence is rapidly becoming a preferred tool in the supply chain, so management must understand the opportunities and challenges associated with its implementation. Furthermore, managers should consider how AI can influence supply chain collaboration concerning trust and forecasting to smooth the bullwhip effect.

Social implications

Digital leadership and addressing the digital skills gap are also essential for the success of AI systems. According to the framework, it is necessary to balance AI performance and accountability. As a result of the framework and structured management approach, the author can examine the implications of AI along the supply chain.

Originality/value

The study uses a systematic literature review based on SNA to analyse how AI can alleviate the bullwhip effects of supply chain disruption and identify the focused and the most important AI topics related to the bullwhip phenomena. SNA uses qualitative and quantitative methodologies to identify research trends, strengths, gaps and future directions for research. Salient topics for reviewing papers were identified. Centrality metrics were used to analyse the contemporary topic’s importance, including degree, betweenness and eigenvector centrality. ABEF is presented in the study.

Details

Journal of Global Operations and Strategic Sourcing, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2398-5364

Keywords

Article
Publication date: 11 October 2023

Radha Subramanyam, Y. Adline Jancy and P. Nagabushanam

Cross-layer approach in media access control (MAC) layer will address interference and jamming problems. Hybrid distributed MAC can be used for simultaneous voice, data…

Abstract

Purpose

Cross-layer approach in media access control (MAC) layer will address interference and jamming problems. Hybrid distributed MAC can be used for simultaneous voice, data transmissions in wireless sensor network (WSN) and Internet of Things (IoT) applications. Choosing the correct objective function in Nash equilibrium for game theory will address fairness index and resource allocation to the nodes. Game theory optimization for distributed may increase the network performance. The purpose of this study is to survey the various operations that can be carried out using distributive and adaptive MAC protocol. Hill climbing distributed MAC does not need a central coordination system and location-based transmission with neighbor awareness reduces transmission power.

Design/methodology/approach

Distributed MAC in wireless networks is used to address the challenges like network lifetime, reduced energy consumption and for improving delay performance. In this paper, a survey is made on various cooperative communications in MAC protocols, optimization techniques used to improve MAC performance in various applications and mathematical approaches involved in game theory optimization for MAC protocol.

Findings

Spatial reuse of channel improved by 3%–29%, and multichannel improves throughput by 8% using distributed MAC protocol. Nash equilibrium is found to perform well, which focuses on energy utility in the network by individual players. Fuzzy logic improves channel selection by 17% and secondary users’ involvement by 8%. Cross-layer approach in MAC layer will address interference and jamming problems. Hybrid distributed MAC can be used for simultaneous voice, data transmissions in WSN and IoT applications. Cross-layer and cooperative communication give energy savings of 27% and reduces hop distance by 4.7%. Choosing the correct objective function in Nash equilibrium for game theory will address fairness index and resource allocation to the nodes.

Research limitations/implications

Other optimization techniques can be applied for WSN to analyze the performance.

Practical implications

Game theory optimization for distributed may increase the network performance. Optimal cuckoo search improves throughput by 90% and reduces delay by 91%. Stochastic approaches detect 80% attacks even in 90% malicious nodes.

Social implications

Channel allocations in centralized or static manner must be based on traffic demands whether dynamic traffic or fluctuated traffic. Usage of multimedia devices also increased which in turn increased the demand for high throughput. Cochannel interference keep on changing or mitigations occur which can be handled by proper resource allocations. Network survival is by efficient usage of valid patis in the network by avoiding transmission failures and time slots’ effective usage.

Originality/value

Literature survey is carried out to find the methods which give better performance.

Details

International Journal of Pervasive Computing and Communications, vol. 20 no. 2
Type: Research Article
ISSN: 1742-7371

Keywords

1 – 10 of 333