Search results

1 – 7 of 7
Book part
Publication date: 2 December 2024

Anubha Anubha, Govind Nath Srivastava and Daviender Narang

The Metaverse and Internet of Things (IoT) have emerged like a tidal wave, and it is creating a transformative impact on society and industry. The metaverse and IoT changed the…

Abstract

The Metaverse and Internet of Things (IoT) have emerged like a tidal wave, and it is creating a transformative impact on society and industry. The metaverse and IoT changed the way companies were operating earlier and customers were living their lives. On the other hand, Metaverse enriches the customer experience by offering a matchless virtual experience using augmented reality and state-of-the-art technology. The metaverse and the IoT can be used in various sectors such as manufacturing, transportation, retailing, health care, banking, and automobiles to make cities smart. Metaverse and IoT provide real-time data, reduces operational cost and errors, improves efficiency, and helps industries to make intelligent decisions. Although the IoT and Metaverse offer significant benefits, it is not free from limitations. Ethical dilemmas, privacy issues, data breaches, and difficulty in extracting relevant data impose serious challenges that need to be addressed. There is an urgent and dire need to create a trade-off between the interest of the business and the privacy and security of customers. This chapter aims to discover the potential of Metaverse and IoT in various sectors (e.g., healthcare, transportation, and electronics). This study will bring significant insights to researchers and policymakers by exploring the likely benefits of IoT and metaverse in diverse sectors to develop smart cities. This chapter will also explain the challenges of metaverse and IoT, which can be addressed by integrating data analytics tools optimally and efficiently.

Details

The Metaverse Dilemma: Challenges and Opportunities for Business and Society
Type: Book
ISBN: 978-1-83797-525-9

Keywords

Open Access
Article
Publication date: 1 April 2024

Ying Miao, Yue Shi and Hao Jing

This study investigates the relationships among digital transformation, technological innovation, industry–university–research collaborations and labor income share in…

1847

Abstract

Purpose

This study investigates the relationships among digital transformation, technological innovation, industry–university–research collaborations and labor income share in manufacturing firms.

Design/methodology/approach

The relationships are tested using an empirical method, constructing regression models, by collecting 1,240 manufacturing firms and 9,029 items listed on the A-share market in China from 2013 to 2020.

Findings

The results indicate that digital transformation has a positive effect on manufacturing companies’ labor income share. Technological innovation can mediate the effect of digital transformation on labor income share. Industry–university–research cooperation can positively moderate the promotion effect of digital transformation on labor income share but cannot moderate the mediating effect of technological innovation. Heterogeneity analysis also found that firms without service-based transformation and nonstate-owned firms are better able to increase their labor income share through digital transformation.

Originality/value

This study provides a new path to increase the labor income share of enterprises to achieve common prosperity, which is important for manufacturing enterprises to better transform and upgrade to achieve high-quality development.

Article
Publication date: 19 November 2024

Ibrahim Abaasi Musenze, Thomas Sifuna Mayende, Mercy Wanyana and Joseph Kasango

Drawing from the social exchange theory and leadership-making model, this study aimed to develop a research model where innovation climate (IC) mediates the servant leadership…

Abstract

Purpose

Drawing from the social exchange theory and leadership-making model, this study aimed to develop a research model where innovation climate (IC) mediates the servant leadership (SL) influence on innovative work behavior (IWB).

Design/methodology/approach

Through structural equation modeling, we evaluated the aforementioned links using data gathered from 324 employees drawn from Uganda’s local government (LG) employees.

Findings

The findings show that the impact of SL on IWB is mediated by IC. An IC within the organization is made possible by effective SL ethos; moreover, this climate promotes IWB. Also, the innovative nature of LG employees promotes IWB.

Research limitations/implications

LG leadership ought to be committed to the SL philosophy since it fosters an environment that encourages IWB. To spark IWB, it should also take advantage of the innovative environment. Management must make sure that in such a setting, supervisors are construed as servant leaders and low cadre staff have the capacity to be servant leaders. Employees will be more motivated to contribute to the organization by engaging in high IWB once they have received the training, empowerment and rewards they deserve in a setting that emphasizes effective SL principles.

Originality/value

Despite the existence of numerous studies, there is little empirical evidence that SL influences IWB within the setting of the LG sector. Evidence for the underlying mechanism by which SL promotes IWB is still lacking. Third, we explicitly test the IWB model developed based on euro-leaning theories using the LG context. Finally, there is a dearth of data relevant to how IC affects IWB. The research addresses these gaps.

Details

Journal of Management Development, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0262-1711

Keywords

Article
Publication date: 30 August 2024

Sijie Tong, Qingchen Liu, Qichao Ma and Jiahu Qin

This paper aims to address the safety concerns of path-planning algorithms in dynamic obstacle warehouse environments. It proposes a method that uses improved artificial potential…

Abstract

Purpose

This paper aims to address the safety concerns of path-planning algorithms in dynamic obstacle warehouse environments. It proposes a method that uses improved artificial potential fields (IAPF) as expert knowledge for an improved deep deterministic policy gradient (IDDPG) and designs a hierarchical strategy for robots through obstacle detection methods.

Design/methodology/approach

The IAPF algorithm is used as the expert experience of reinforcement learning (RL) to reduce the useless exploration in the early stage of RL training. A strategy-switching mechanism is introduced during training to adapt to various scenarios and overcome challenges related to sparse rewards. Sensor inputs, including light detection and ranging data, are integrated to detect obstacles around waypoints, guiding the robot toward the target point.

Findings

Simulation experiments demonstrate that the integrated use of IDDPG and the IAPF method significantly enhances the safety and training efficiency of path planning for mobile robots.

Originality/value

This method enhances safety by applying safety domain judgment rules to improve APF’s security and designing an obstacle detection method for better danger anticipation. It also boosts training efficiency through using IAPF as expert experience for DDPG and the classification storage and sampling design for the RL experience pool. Additionally, adjustments to the actor network’s update frequency expedite convergence.

Details

Robotic Intelligence and Automation, vol. 44 no. 6
Type: Research Article
ISSN: 2754-6969

Keywords

Article
Publication date: 27 August 2024

Xiaoli Li, Zihan Peng and Kun Li

This study aims to explore the mechanism of boundary-spanning search on firm’s innovation performance under environmental dynamics from the perspective of strategic knowledge…

Abstract

Purpose

This study aims to explore the mechanism of boundary-spanning search on firm’s innovation performance under environmental dynamics from the perspective of strategic knowledge integration.

Design/methodology/approach

A survey was conducted among Chinese firm managers and R&D personnel, resulting in the collection of 315 valid samples. Hierarchical regression analysis was mainly adopted to demonstrate the hypothesized relationships, while the Sobel test and bootstrap method were used to further validate the mediating effects.

Findings

The results demonstrate that boundary-spanning search in different dimensions is a critical factor in the improvement of firm innovation performance (FIP). Two types of strategic knowledge integration are the main factors causing FIP and mediate the influence of boundary-spanning search on FIP. Furthermore, environmental dynamics moderate the relationship among boundary-spanning search, strategic knowledge integration and FIP.

Practical implications

Managers need to strengthen the boundary-spanning search for market and technical knowledge, which will promote firm innovative performance. Managers also need to implement strategic knowledge integration, which specifically includes using planned strategic knowledge integration to compensate for knowledge deficiencies, thereby achieving predetermined objectives; and using emergent strategic knowledge integration to update their understanding of internal and external environments, and to reset strategic objectives. In dynamic environments, managers should emphasize strategic knowledge management activities more.

Originality/value

From a strategic management perspective, this study categorizes strategic knowledge integration into planned and emergent forms. By applying the logic of knowledge acquisition, integration and creation, it explores how boundary-spanning search affects FIP through strategic knowledge integration as the intermediary and the boundary conditions of environmental dynamics. This not only provides a deeper understanding of the nature and effects of boundary-spanning research but also enhances the theory of strategic knowledge management.

Details

Journal of Knowledge Management, vol. 28 no. 10
Type: Research Article
ISSN: 1367-3270

Keywords

Article
Publication date: 7 November 2024

Liqiong Chen, Lei Yunjie and Sun Huaiying

This study aims to solve the problems of large training sample size, low data sample quality, low efficiency of the currently used classical model, high computational complexity…

Abstract

Purpose

This study aims to solve the problems of large training sample size, low data sample quality, low efficiency of the currently used classical model, high computational complexity of the existing concern mechanism, and high graphics processing unit (GPU) occupancy in the current visualization software defect prediction, proposing a method for software defect prediction termed recurrent criss-cross attention for weighted activation functions of recurrent SE-ResNet (RCCA-WRSR). First, following code visualization, the activation functions of the SE-ResNet model are replaced with a weighted combination of Relu and Elu to enhance model convergence. Additionally, an SE module is added before it to filter feature information, eliminating low-weight features to generate an improved residual network model, WRSR. To focus more on contextual information and establish connections between a pixel and those not in the same cross-path, the visualized red as integer, green as integer, blue as integer images are inputted into a model incorporating a fused RCCA module for defect prediction.

Design/methodology/approach

Software defect prediction based on code visualization is a new software defect prediction technology, which mainly realizes the defect prediction of code by visualizing code as image, and then applying attention mechanism to extract the features of image. However, the challenges of current visualization software defect prediction mainly include the large training sample size and low sample quality of the data, and the classical models used today are not efficient, and the existing attention mechanisms have high computational complexity and high GPU occupancy.

Findings

Experimental evaluation using ten open-source Java data sets from PROMISE and five existing methods demonstrates that the proposed approach achieves an F-measure value of 0.637 in predicting 16 cross-version projects, representing a 6.1% improvement.

Originality/value

RCCA-WRSR is a new visual software defect prediction based on recurrent criss-cross attention and improved residual network. This method effectively enhances the performance of software defect prediction.

Details

International Journal of Web Information Systems, vol. 20 no. 6
Type: Research Article
ISSN: 1744-0084

Keywords

Article
Publication date: 20 November 2024

Huaiyu Jia, Dajiang Chen, Zhidong Xie and Zhiguang Qin

This paper aims to provide a secure and efficient pairing protocol for two devices. Due to the large amount of data involving sensitive information transmitted in Internet of…

Abstract

Purpose

This paper aims to provide a secure and efficient pairing protocol for two devices. Due to the large amount of data involving sensitive information transmitted in Internet of Things (IoT) devices, generating a secure shared key between smart devices for secure data sharing becomes essential. However, existing smart devices pairing schemes require longer pairing time and are difficult to resist attacks caused by context, as the secure channel is established based on restricted entropy from physical context.

Design/methodology/approach

This paper proposes a fuzzy smart IoT device pairing protocol via speak to microphone, FS2M. In FS2M, the device pairing is realized from the speaking audio of humans in the environment around the devices, which is easily implemented in the vast majority of Internet products. Specifically, to protect the privacy of secret keys and improve efficiency, this paper presents a single-round pairing protocol by adopting a recently published asymmetric fuzzy encapsulation mechanism (AFEM), which allows devices with similar environmental fingerprints to successfully negotiate the shared key. To instantiate AFEM, this paper presents a construction algorithm, the AFEM-ECC, based on elliptic curve cryptography.

Findings

This paper analyzes the security of the FS2M and its pairing efficiency with extensive experiments. The results show that the proposed protocol can achieve a secure device pairing between two IoT devices with high efficiency.

Originality/value

In FS2M, a novel cryptographic primitive (i.e., AFEM-ECC) are designed for IoT device pairing by using a new context-environment (i.e., human voice) . The experimental results show that FS2M has a good performance in both communication cost (i.e., 130 KB) and running time (i.e., 10 S).

Details

International Journal of Web Information Systems, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1744-0084

Keywords

1 – 7 of 7