Search results

1 – 10 of 313
Article
Publication date: 12 April 2023

Shaobo Liang and Linfeng Yu

As voice search has progressively become a new way of information acquisition and human–computer interaction, this paper aims to explore the users' voice search behavior in…

Abstract

Purpose

As voice search has progressively become a new way of information acquisition and human–computer interaction, this paper aims to explore the users' voice search behavior in human–vehicle interaction.

Design/methodology/approach

This study employed mixed research methods, including questionnaires and interviews. A total of 151 Amazon MTurk volunteers were recruited to complete a questionnaire based on their most recent and impressive voice search experience. After the questionnaire, this paper conducted an online interview with the participants.

Findings

This paper studied users' voice search behavior characteristics in the context of the human–vehicle interaction and analyzed the voice search content, search need, search motivation and user satisfaction. In addition, this paper studied the barriers and suggestions for voice search in human–vehicle interaction through a content analysis of the interviews.

Practical implications

This paper's analysis of users' barriers and suggestions has a specific reference value for optimizing the voice search interaction system and improving the service.

Originality/value

This study is exploratory research that seeks to identify users' voice search needs and tasks and investigate voice search satisfaction in human–vehicle interaction context.

Details

Library Hi Tech, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0737-8831

Keywords

Article
Publication date: 13 February 2024

Amer Jazairy, Emil Persson, Mazen Brho, Robin von Haartman and Per Hilletofth

This study presents a systematic literature review (SLR) of the interdisciplinary literature on drones in last-mile delivery (LMD) to extrapolate pertinent insights from and into…

Abstract

Purpose

This study presents a systematic literature review (SLR) of the interdisciplinary literature on drones in last-mile delivery (LMD) to extrapolate pertinent insights from and into the logistics management field.

Design/methodology/approach

Rooting their analytical categories in the LMD literature, the authors performed a deductive, theory refinement SLR on 307 interdisciplinary journal articles published during 2015–2022 to integrate this emergent phenomenon into the field.

Findings

The authors derived the potentials, challenges and solutions of drone deliveries in relation to 12 LMD criteria dispersed across four stakeholder groups: senders, receivers, regulators and societies. Relationships between these criteria were also identified.

Research limitations/implications

This review contributes to logistics management by offering a current, nuanced and multifaceted discussion of drones' potential to improve the LMD process together with the challenges and solutions involved.

Practical implications

The authors provide logistics managers with a holistic roadmap to help them make informed decisions about adopting drones in their delivery systems. Regulators and society members also gain insights into the prospects, requirements and repercussions of drone deliveries.

Originality/value

This is one of the first SLRs on drone applications in LMD from a logistics management perspective.

Details

The International Journal of Logistics Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0957-4093

Keywords

Article
Publication date: 21 November 2023

Keshan (Sara) Wei and Wanyu Xi

With the development of social media, live-streaming has become an indispensable marketing activity for firms, especially in China. From the initial cooperation with the…

Abstract

Purpose

With the development of social media, live-streaming has become an indispensable marketing activity for firms, especially in China. From the initial cooperation with the influencer, firms begin to create their own live-streaming channel, namely, the brands' self-built live-streaming. The purpose of this study is to explore the process of consumer engagement in the brands' self-built live-streaming.

Design/methodology/approach

This research comprises two experimental studies. Study 1 examined the effect of streamer types (CEO vs. celebrity) on consumer engagement. Study 2 investigated the moderating effects of product innovativeness.

Findings

Results showed that CEO streamers could enhance consumer engagement by increasing consumers' cognitive trust, and celebrity streamers could enhance consumer engagement by increasing consumers' emotional trust. In addition, consumer engagement was higher for really new products (vs. incremental new products) in CEO streamers' (vs. celebrity streamers') live-streaming.

Originality/value

Compared with previous studies that focused on streamers based on the influencer marketing, this study expands the scope of research on the live-streaming ecosystem by exploring the effect of different streamer types on the brands' self-built live-streaming. By investigating consumer engagement, this study gives implications for the sustainable traffic issue in live-streaming e-commerce.

Details

Journal of Research in Interactive Marketing, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2040-7122

Keywords

Article
Publication date: 13 December 2023

Long Li, Shuqi Wang, Saixing Zeng, Hanyang Ma and Ruiyan Zheng

Social responsibility (SR) has become critical in facilitating the sustainability of new infrastructure construction (NIC) and is also a nonnegligible aspect in its management…

Abstract

Purpose

Social responsibility (SR) has become critical in facilitating the sustainability of new infrastructure construction (NIC) and is also a nonnegligible aspect in its management. Although studies attempting to explore this issue from various and disparate perspectives have become increasingly popular, no consensus has yet been reached regarding what SR factors affect NIC management. This paper aims to establish an inventory of SR factors for NIC and reveal a comprehensive framework for SR of NIC (NIC-SR) management through an in-depth analysis of the relationships among factors.

Design/methodology/approach

This article proposes a mixed-review method that combines the preferred reporting items for systematic reviews and meta-analyses and content analysis methods as a solution.

Findings

From 62 chosen publications on NIC-SR published in peer-reviewed journals between 2010 and 2022, a total of 44 SR factors were found. These 44 SR factors were divided into 4 interconnected categories: political, ethics-environmental, legal and economic. Based on the interactions among SR factors and incorporating the impact of the four categories of SR factors on NIC management, an integrated framework from micro to macro was developed.

Originality/value

This paper educates researchers and practitioners about the SR factors that must be considered to improve the sustainability of NIC management and provides practical implications for architectural, engineering and construction (AEC) practices. Furthermore, it serves as an impetus for governments to improve their programs and policies and fulfill social responsibilities.

Details

Engineering, Construction and Architectural Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0969-9988

Keywords

Article
Publication date: 19 January 2024

Shaoyan Wu, Mengxiao Liu, Duo Zhao and Tingting Cao

Although trust is generally taken as a fundamental factor in influencing relational behavior in contractor–subcontractor collaboration, the determination of an optimal level of…

Abstract

Purpose

Although trust is generally taken as a fundamental factor in influencing relational behavior in contractor–subcontractor collaboration, the determination of an optimal level of trust is still lacking. Trust with an optimal tipping point that matches dependence best is considered the optimal trust to improve relational behavior between general contractors and subcontractors. To fill the knowledge gap, this study explores how combinations of trust and dependence trigger relational behavior between general contractors and subcontractors through a configurational approach.

Design/methodology/approach

Questionnaires were administered to 228 middle management and technical staff members of the general contractor. The data were analyzed using fuzzy-set qualitative comparative analysis (fsQCA), and the inductive analytic method allowed researchers to explore configurations of different dimensions and levels of dependence and trust.

Findings

Necessity analysis results indicated that neither dependence nor trust was a necessary condition for facilitating relational behavior. Through sufficiency analysis, four configurations of optimal trust matched with dependence were identified in contractor–subcontractor collaboration. Even if contractors rely only on subcontractors for resources, the optimal trust between contractors and subcontractors should include both institution- and cognition-based trust. In the event that contractor–subcontractor collaboration involves relational dependence, both affect- and cognition-based trust are necessary for the optimal trust.

Originality/value

This study enhances existing research by delving deeper into a nuanced understanding of optimal trust in dependence scenarios, and enriches project governance theory by uncovering the internal transmission of relational governance. Practically, this study offers general contractors guidance on how to establish optimal trust strategies based on the dual dependence level with subcontractors, which can facilitate subcontractors' relational behavior, and ultimately improve contractor–subcontractor collaboration performance.

Details

Engineering, Construction and Architectural Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0969-9988

Keywords

Article
Publication date: 22 June 2022

Shubangini Patil and Rekha Patil

Until now, a lot of research has been done and applied to provide security and original data from one user to another, such as third-party auditing and several schemes for…

Abstract

Purpose

Until now, a lot of research has been done and applied to provide security and original data from one user to another, such as third-party auditing and several schemes for securing the data, such as the generation of the key with the help of encryption algorithms like Rivest–Shamir–Adleman and others. Here are some of the related works that have been done previously. Remote damage control resuscitation (RDCR) scheme by Yan et al. (2017) is proposed based on the minimum bandwidth. By enabling the third party to perform the verification of public integrity. Although it supports the repair management for the corrupt data and tries to recover the original data, in practicality it fails to do so, and thus it takes more computation and communication cost than our proposed system. In a paper by Chen et al. (2015), using broadcast encryption, an idea for cloud storage data sharing has been developed. This technique aims to accomplish both broadcast data and dynamic sharing, allowing users to join and leave a group without affecting the electronic press kit (EPK). In this case, the theoretical notion was true and new, but the system’s practicality and efficiency were not acceptable, and the system’s security was also jeopardised because it proposed adding a member without altering any keys. In this research, an identity-based encryption strategy for data sharing was investigated, as well as key management and metadata techniques to improve model security (Jiang and Guo, 2017). The forward and reverse ciphertext security is supplied here. However, it is more difficult to put into practice, and one of its limitations is that it can only be used for very large amounts of cloud storage. Here, it extends support for dynamic data modification by batch auditing. The important feature of the secure and efficient privacy preserving provable data possession in cloud storage scheme was to support every important feature which includes data dynamics, privacy preservation, batch auditing and blockers verification for an untrusted and an outsourced storage model (Pathare and Chouragadec, 2017). A homomorphic signature mechanism was devised to prevent the usage of the public key certificate, which was based on the new id. This signature system was shown to be resistant to the id attack on the random oracle model and the assault of forged message (Nayak and Tripathy, 2018; Lin et al., 2017). When storing data in a public cloud, one issue is that the data owner must give an enormous number of keys to the users in order for them to access the files. At this place, the knowledge assisted software engineering (KASE) plan was publicly unveiled for the first time. While sharing a huge number of documents, the data owner simply has to supply the specific key to the user, and the user only needs to provide the single trapdoor. Although the concept is innovative, the KASE technique does not apply to the increasingly common manufactured cloud. Cui et al. (2016) claim that as the amount of data grows, distribution management system (DMS) will be unable to handle it. As a result, various proven data possession (PDP) schemes have been developed, and practically all data lacks security. So, here in these certificates, PDP was introduced, which was based on bilinear pairing. Because of its feature of being robust as well as efficient, this is mostly applicable in DMS. The main purpose of this research is to design and implement a secure cloud infrastructure for sharing group data. This research provides an efficient and secure protocol for multiple user data in the cloud, allowing many users to easily share data.

Design/methodology/approach

The methodology and contribution of this paper is given as follows. The major goal of this study is to design and implement a secure cloud infrastructure for sharing group data. This study provides an efficient and secure protocol for multiple user data in cloud, allowing several users to share data without difficulty. The primary purpose of this research is to design and implement a secure cloud infrastructure for sharing group data. This research develops an efficient and secure protocol for multiple user data in the cloud, allowing numerous users to exchange data without difficulty. Selection scheme design (SSD) comprises two algorithms; first algorithm is designed for limited users and algorithm 2 is redesigned for the multiple users. Further, the authors design SSD-security protocol which comprises a three-phase model, namely, Phase 1, Phase 2 and Phase 3. Phase 1 generates the parameters and distributes the private key, the second phase generates the general key for all the users that are available and third phase is designed to prevent the dishonest user to entertain in data sharing.

Findings

Data sharing in cloud computing provides unlimited computational resources and storage to enterprise and individuals; moreover, cloud computing leads to several privacy and security concerns such as fault tolerance, reliability, confidentiality and data integrity. Furthermore, the key consensus mechanism is fundamental cryptographic primitive for secure communication; moreover, motivated by this phenomenon, the authors developed SSDmechanismwhich embraces the multiple users in the data-sharing model.

Originality/value

Files shared in the cloud should be encrypted for security purpose; later these files are decrypted for the users to access the file. Furthermore, the key consensus process is a crucial cryptographic primitive for secure communication; additionally, the authors devised the SSD mechanism, which incorporates numerous users in the data-sharing model, as a result of this phenomena. For evaluation of the SSD method, the authors have considered the ideal environment of the system, that is, the authors have used java as a programming language and eclipse as the integrated drive electronics tool for the proposed model evaluation. Hardware configuration of the model is such that it is packed with 4 GB RAM and i7 processor, the authors have used the PBC library for the pairing operations (PBC Library, 2022). Furthermore, in the following section of this paper, the number of users is varied to compare with the existing methodology RDIC (Li et al., 2020). For the purposes of the SSD-security protocol, a prime number is chosen as the number of users in this work.

Details

International Journal of Pervasive Computing and Communications, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 13 July 2023

Hamid Nayebpour and Saied Sehhat

The main goal of any organization is to achieve the best quality of work through employees, and managers play a very important role in this field. Managers and leaders of…

Abstract

Purpose

The main goal of any organization is to achieve the best quality of work through employees, and managers play a very important role in this field. Managers and leaders of organizations often face with paradoxes that make decision-making difficult. The purpose of this paper is to develop a competency model for human resource managers considering the importance of the role of paradoxes for organizations.

Design/methodology/approach

The research methodology is of a mixed type and with an approach based on paradox theory and using theme analysis and fuzzy Delphi, it seeks to provide a model of paradoxical managers’ competence. The statistical sample included 11 experts working in the information and communication technology industry, who were selected using the snowball and judgmental sampling method.

Findings

The results of this research show that the competency model of human resource managers has three managerial, organizational and individual levels and has 15 themes including strategic partner, organizational knowledge, awareness of the industry environment, awareness of the external environment, paradoxical thinking, managerial knowledge, relationship management, resource management , leadership, human resources analyzer, information technology (IT) knowledge, personality traits, development, multitasking and cognitive competence. The most important theme identified is paradoxical thinking and familiarity with IT knowledge, and it is suggested that human resource managers working in this field should preferably study technical and engineering fields at the undergraduate level and shift to human resource management fields at the graduate level.

Originality/value

The distinguishing feature of this paper is the presentation of a competency model based on paradox theory. Paradoxes are part of organizational life. Therefore, there should be a paradoxical view in all organizational analysis.

Details

International Journal of Organizational Analysis, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1934-8835

Keywords

Article
Publication date: 22 January 2024

Yanhui Du, Jingfeng Yuan, ShouQing Wang, Yan Liu and Ningshuang Zeng

The information used for supervision by regulatory departments in public-private partnership (PPP) projects is primarily transmitted and processed by the PPP implementation…

110

Abstract

Purpose

The information used for supervision by regulatory departments in public-private partnership (PPP) projects is primarily transmitted and processed by the PPP implementation department, which negatively impacts the information quality, leading to information asymmetry and undermining the overall effectiveness of supervision. This study aims to explore how to use blockchain to anchor the information used for supervision in PPP projects to the original information, to strengthen the oversight.

Design/methodology/approach

This paper adopts the principles of design science research (DSR) to design a conceptual framework that systematically organizes information along the information dissemination chain, ensuring the reliable anchoring of original information. Two-stage interviews involving experts from academia and industry are conducted, serving as formative and summative evaluations to guide the design.

Findings

The framework establishes a weak-centralized information organizing mode, including the design of governance community and on-chain and off-chain governance mechanisms. Feedback from experts is collected via interviews and the designed framework is thought to improve information used for supervision. Constructive suggestions are also collected and analyzed for further development.

Originality/value

This paper provides a novel example exploring the inspirations blockchain can bring to project governance, like exercising caution regarding the disorderly expansion of public sector authority in addressing information disadvantages and how to leverage blockchain to achieve this. Technical details conveyed by the framework deepen understanding of how blockchain benefits and the challenges faced in successful implementation for practitioners and policymakers. The targeted evaluation serves as rigorous validation, guiding experts to provide reliable feedback and richer insights by offering them a more cognitively convenient scenario.

Details

Engineering, Construction and Architectural Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0969-9988

Keywords

Article
Publication date: 27 March 2023

Yiran Dan and Guiwen Liu

Production and transportation of precast components, as two continuous service stages of a precast plant, play an important role in meeting customer needs and controlling costs…

Abstract

Purpose

Production and transportation of precast components, as two continuous service stages of a precast plant, play an important role in meeting customer needs and controlling costs. However, there is still a lack of production and transportation scheduling methods that comprehensively consider delivery timeliness and transportation economy. This article aims to study the integrated scheduling optimization problem of in-plant flowshop production and off-plant transportation under the consideration of practical constraints of customer order delivery time window, and seek an optimal scheduling method that balances delivery timeliness and transportation economy.

Design/methodology/approach

In this study, an integrated scheduling optimization model of flowshop production and transportation for precast components with delivery time windows is established, which describes the relationship between production and transportation and handles transportation constraints under the premise of balancing delivery timeliness and transportation economy. Then a genetic algorithm is designed to solve this model. It realizes the integrated scheduling of production and transportation through double-layer chromosome coding. A program is designed to realize the solution process. Finally, the validity of the model is proved by the calculation of actual enterprise data.

Findings

The optimized scheduling scheme can not only meet the on-time delivery, but also improve the truck loading rate and reduce the total cost, composed of early cost in plant, delivery penalty cost and transportation cost. In the model validation, the optimal scheduling scheme uses one less truck than the traditional EDD scheme (saving 20% of the transportation cost), and the total cost can be saved by 17.22%.

Originality/value

This study clarifies the relationship between the production and transportation of precast components and establishes the integrated scheduling optimization model and its solution algorithm. Different from previous studies, the proposed optimization model can balance the timeliness and economy of production and transportation for precast components.

Details

Engineering, Construction and Architectural Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0969-9988

Keywords

Article
Publication date: 21 November 2023

Ming-Chang Huang, Ting-Chuan Lin, Ping-Hsin Lin, Ya-Ping Chiu and Chi-Hung Chung

This study aims to investigate whether higher value creation leads to higher value appropriation and to identify the boundary conditions in a buyer–supplier relationship that can…

Abstract

Purpose

This study aims to investigate whether higher value creation leads to higher value appropriation and to identify the boundary conditions in a buyer–supplier relationship that can explain why a particular supplier can appropriate higher value than others.

Design/methodology/approach

The study uses questionnaire surveys. The sample of the survey has 150 publicly-listed supplier firms in Taiwan. The unit of analysis is the buyer–supplier relationship.

Findings

In the buyer–supplier relationship, suppliers’ bargaining power, partnership and a supplier’s original brand manufacturing (OBM) business can strengthen the positive relationship between value creation and value appropriation.

Research limitations/implications

This study adopts the unilateral viewpoint of suppliers; however, some constructs might require dyadic evaluation. This study only explores the spillover effect of OBM business on the relationship between value creation and appropriation.

Practical implications

The spillover effect of a supplier’s OBM business in a buyer–supplier relationship allows the buyer to share more common benefits and the supplier to capture more private benefits as compensation. By broadening its customer base, a supplier can increase its bargaining power. A supplier can also maintain a strategic partnership with each essential buyer.

Originality/value

To avoid the dark-side effect of partnership, the model provides the contingency that a supplier can capture more value from a buyer–supplier relationship.

Details

Journal of Business & Industrial Marketing, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0885-8624

Keywords

1 – 10 of 313