Search results

1 – 10 of over 4000
Book part
Publication date: 7 October 2015

Azizah Ahmad

The strategic management literature emphasizes the concept of business intelligence (BI) as an essential competitive tool. Yet the sustainability of the firms’ competitive…

Abstract

The strategic management literature emphasizes the concept of business intelligence (BI) as an essential competitive tool. Yet the sustainability of the firms’ competitive advantage provided by BI capability is not well researched. To fill this gap, this study attempts to develop a model for successful BI deployment and empirically examines the association between BI deployment and sustainable competitive advantage. Taking the telecommunications industry in Malaysia as a case example, the research particularly focuses on the influencing perceptions held by telecommunications decision makers and executives on factors that impact successful BI deployment. The research further investigates the relationship between successful BI deployment and sustainable competitive advantage of the telecommunications organizations. Another important aim of this study is to determine the effect of moderating factors such as organization culture, business strategy, and use of BI tools on BI deployment and the sustainability of firm’s competitive advantage.

This research uses combination of resource-based theory and diffusion of innovation (DOI) theory to examine BI success and its relationship with firm’s sustainability. The research adopts the positivist paradigm and a two-phase sequential mixed method consisting of qualitative and quantitative approaches are employed. A tentative research model is developed first based on extensive literature review. The chapter presents a qualitative field study to fine tune the initial research model. Findings from the qualitative method are also used to develop measures and instruments for the next phase of quantitative method. The study includes a survey study with sample of business analysts and decision makers in telecommunications firms and is analyzed by partial least square-based structural equation modeling.

The findings reveal that some internal resources of the organizations such as BI governance and the perceptions of BI’s characteristics influence the successful deployment of BI. Organizations that practice good BI governance with strong moral and financial support from upper management have an opportunity to realize the dream of having successful BI initiatives in place. The scope of BI governance includes providing sufficient support and commitment in BI funding and implementation, laying out proper BI infrastructure and staffing and establishing a corporate-wide policy and procedures regarding BI. The perceptions about the characteristics of BI such as its relative advantage, complexity, compatibility, and observability are also significant in ensuring BI success. The most important results of this study indicated that with BI successfully deployed, executives would use the knowledge provided for their necessary actions in sustaining the organizations’ competitive advantage in terms of economics, social, and environmental issues.

This study contributes significantly to the existing literature that will assist future BI researchers especially in achieving sustainable competitive advantage. In particular, the model will help practitioners to consider the resources that they are likely to consider when deploying BI. Finally, the applications of this study can be extended through further adaptation in other industries and various geographic contexts.

Details

Sustaining Competitive Advantage Via Business Intelligence, Knowledge Management, and System Dynamics
Type: Book
ISBN: 978-1-78441-764-2

Keywords

Book part
Publication date: 3 July 2018

Emily Anderson

The United Nations (UN) actively incorporated new media as a tool for consultation and agenda setting during the Millennium Development Goal (MDG)–Sustainable Development Goal…

Abstract

The United Nations (UN) actively incorporated new media as a tool for consultation and agenda setting during the Millennium Development Goal (MDG)–Sustainable Development Goal (SDG) transition. As global actors shifted their attention to the sustainable development goals, the UN and its partners scaled up their digital engagement with civil society, multinational agencies, and country-level stakeholders to inform the post-2015 agenda. This chapter explored how the UN integrated Twitter into the post-2015 consultation and how the UN Women and the United Nations Girls’ Education Initiative used Twitter to construct and diffuse girls’ education policy discourse during the MDG–SDG transition.

Details

Cross-nationally Comparative, Evidence-based Educational Policymaking and Reform
Type: Book
ISBN: 978-1-78743-767-8

Keywords

Book part
Publication date: 30 May 2017

Brasilina Passarelli and Alan César Belo Angeluci

This chapter presents the perspective of the 27-year-old Brazilian research center at the University of São Paulo – School of the Future USP – representing the institution’s views…

Abstract

This chapter presents the perspective of the 27-year-old Brazilian research center at the University of São Paulo – School of the Future USP – representing the institution’s views on our hyperconnected contemporary society. The discussion of key concepts, focusing on the Internet of things and big data, grounds the analysis of symptomatic shifts centered on mobility and connectivity. In addition, the manuscript highlights the new roles of actor-network structures in the new economy, emphasizing new literacies and trends in open and coding culture. Authors such as Bruno Latour, Manuel Castells, Luciano Floridi, Paul Gilster, and many others support the approach, which provides a fruitful theoretical framework that will guide the center’s research in the next coming 15 years, and likely influence other research groups studying society and hyperconnection.

Details

Brazil
Type: Book
ISBN: 978-1-78635-785-4

Keywords

Open Access
Book part
Publication date: 6 June 2024

Sun Sun Lim and Yang Wang

Abstract

Details

Digital Parenting Burdens in China: Online Homework, Parent Chats and Punch-in Culture
Type: Book
ISBN: 978-1-83797-758-1

Book part
Publication date: 23 January 2023

J. Tom Mueller and Alexis A. Merdjanoff

COVID-19 has had remarkable impacts in rural America. Although the onset of the pandemic was in urban areas, it quickly spread to rural areas and ultimately resulted in higher

Abstract

COVID-19 has had remarkable impacts in rural America. Although the onset of the pandemic was in urban areas, it quickly spread to rural areas and ultimately resulted in higher mortality rates for rural populations. Due to this and other associated impacts, the pandemic has resulted in mental health issues across rural America. In this chapter, the authors first describe the state of rural America pre-pandemic, then detail the overall and mental health impacts of the pandemic on rural people. Following this, the authors report results of a case study on COVID-19 in the rural America West and conclude with recommended steps for addressing the unfolding crisis. Many of the steps the authors can take to improve rural mental health following the pandemic have long-been necessary. However, given the impacts of COVID-19, they are now needed more than ever.

Details

COVID-19, Frontline Responders and Mental Health: A Playbook for Delivering Resilient Public Health Systems Post-Pandemic
Type: Book
ISBN: 978-1-80262-115-0

Keywords

Open Access
Article
Publication date: 13 September 2023

Siyao Li, Bo Yuan, Yun Bai and Jianfeng Liu

To address the problem that the current train operation mode that train selects one of several offline pre-generated control schemes before the departure and operates following…

Abstract

Purpose

To address the problem that the current train operation mode that train selects one of several offline pre-generated control schemes before the departure and operates following the scheme after the departure, energy-saving performance of the whole metro system cannot be guaranteed.

Design/methodology/approach

A cooperative train control framework is formulated to regulate a novel train operation mode. The classic train four-phase control strategy is improved for generating specific energy-efficient control schemes for each train. An improved brute force (BF) algorithm with a two-layer searching idea is designed to solve the optimisation model of energy-efficient train control schemes.

Findings

Case studies on the actual metro line in Guangzhou, China verify the effectiveness of the proposed train control methods compared with four-phase control strategy under different kinds of train operation scenarios and calculation parameters. The verification on the computation efficiency as well as accuracy of the proposed algorithm indicates that it meets the requirement of online optimisation.

Originality/value

Most existing studies optimised energy-efficient train timetable or train control strategies through an offline process, which has a defect in coping with the disturbance or delays effectively and promptly during real-time train operation. This paper studies an online optimisation of cooperative train control based on the rolling optimisation idea, where energy-efficient train operation can be realised once train running time is determined, thus mitigating the impact of unpredictable operation situations on the energy-saving performance of trains.

Details

Railway Sciences, vol. 2 no. 3
Type: Research Article
ISSN: 2755-0907

Keywords

Book part
Publication date: 8 August 2022

Heather Steele and Clive Roberts

Digital technologies provide an opportunity for the rail sector to achieve social, economic and environmental sustainability, if implemented correctly. Unlocking the full

Abstract

Digital technologies provide an opportunity for the rail sector to achieve social, economic and environmental sustainability, if implemented correctly. Unlocking the full potential of technology, however, will require significant changes beyond the technological. Physical assets will need to link with digital assets, making best use of data, simulation and modelling. Transformational leadership informed by systems engineering will be necessary to deliver the change process required to innovate across the whole railway life cycle. Each of these digital railway elements – technology, data, simulation, transformational leadership and systems engineering – presents challenges to be overcome. The authors believe that by instilling core values alongside technical expertise, by being open, resilient, responsive, customer-centric and valuing people, the digital railway has the power to transform the sector. It will enable improved railway processes; safer, faster and more reliable trains; better customer experience; cost-effectiveness; and reduced carbon emissions and more. The digital railway will not just realise the current vision but form the foundation for a sustainable railway to meet changing mobility needs well beyond 2050.

Details

Sustainable Railway Engineering and Operations
Type: Book
ISBN: 978-1-83909-589-4

Keywords

Article
Publication date: 2 January 2023

Deepak Choudhary

As the number of devices that connect to the Internet of Things (IoT) has grown, privacy and security issues have come up. Because IoT devices collect so much sensitive…

Abstract

Purpose

As the number of devices that connect to the Internet of Things (IoT) has grown, privacy and security issues have come up. Because IoT devices collect so much sensitive information, like user names, locations, phone numbers and even how they usually use energy, it is very important to protect users' privacy and security. IoT technology will be hard to use on the client side because IoT-enabled devices do not have clear privacy and security controls.

Design/methodology/approach

IoT technology would be harder to use on the client side if the IoT did not offer enough well-defined ways to protect users’ privacy and security. The goal of this research is to protect people's privacy in the IoT by using the oppositional artificial flora optimization (EGPKC-OAFA) algorithm to generate the best keys for the ElGamal public key cryptosystem (EGPKC). The EGPKC-OAFA approach puts the most weight on the IEEE 802.15.4 standard for MAC, which is the most important part of the standard. The security field is part of the MAC header of this standard. In addition, the MAC header includes EGPKC, which makes it possible to make authentication keys as quickly as possible.

Findings

With the proliferation of IoT devices, privacy and security have become major concerns in the academic world. Security and privacy are of the utmost importance due to the large amount of personally identifiable information acquired by IoT devices, such as name, location, phone numbers and energy use. Client-side deployment of IoT technologies will be hampered by the absence of well-defined privacy and security solutions afforded by the IoT. The purpose of this research is to present the EGPKC with optimum key generation using the EGPKC-OAFA algorithm for the purpose of protecting individual privacy within the context of the IoT. The EGPKC-OAFA approach is concerned with the MAC standard defined by the IEEE 802.15.4 standard, which includes the security field in its MAC header. Also, the MAC header incorporates EGPKC, which enables the fastest possible authentication key generation. In addition, the best methodology award goes to the OAFA strategy, which successfully implements the optimum EGPKC selection strategy by combining opposition-based (OBL) and standard AFA ideas. The EGPKC-OAFA method has been proved to effectively analyze performance in a number of simulations, with the results of various functions being identified.

Originality/value

In light of the growing prevalence of the IoT, an increasing number of people are becoming anxious about the protection and confidentiality of the personal data that they save online. This is especially true in light of the fact that more and more things are becoming connected to the internet. The IoT is capable of gathering personally identifiable information such as names, addresses and phone numbers, as well as the quantity of energy that is used. It will be challenging for customers to adopt IoT technology because of worries about the security and privacy of the data generated by users. In this work, the EGPKC is paired with adversarial artificial flora, which leads in an increase to the privacy security provided by EGPKC for the IoT (EGPKC-OAFA). The MAC security field that is part of the IEEE 802.15.4 standard is one of the areas that the EGPKC-OAFA protocol places a high focus on. The Authentication Key Generation Protocol Key Agreement, also known as EGPKCA, is used in MAC headers. The abbreviation for this protocol is EGPKCA. The OAFA technique, also known as the combination of OBL and AFA, is the most successful method for selecting EGPKCs. This method is recognized by its acronym, OAFA. It has been shown via a variety of simulations that the EGPKC-OAFA technique is a very useful instrument for carrying out performance analysis.

Details

International Journal of Pervasive Computing and Communications, vol. 19 no. 5
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 26 April 2022

Jianpeng Zhang and Mingwei Lin

The purpose of this paper is to make an overview of 6,618 publications of Apache Hadoop from 2008 to 2020 in order to provide a conclusive and comprehensive analysis for…

Abstract

Purpose

The purpose of this paper is to make an overview of 6,618 publications of Apache Hadoop from 2008 to 2020 in order to provide a conclusive and comprehensive analysis for researchers in this field, as well as a preliminary knowledge of Apache Hadoop for interested researchers.

Design/methodology/approach

This paper employs the bibliometric analysis and visual analysis approaches to systematically study and analyze publications about Apache Hadoop in the Web of Science database. This study aims to investigate the topic of Apache Hadoop by means of bibliometric analysis with the aid of visualization applications. Through the bibliometric analysis of the collected documents, this paper analyzes the main statistical characteristics and cooperation networks. Research themes, research hotspots and future development trends are also investigated through the keyword analysis.

Findings

The research on Apache Hadoop is still the top priority in the future, and how to improve the performance of Apache Hadoop in the era of big data is one of the research hotspots.

Research limitations/implications

This paper makes a comprehensive analysis of Apache Hadoop with methods of bibliometrics, and it is valuable for researchers can quickly grasp the hot topics in this area.

Originality/value

This paper draws the structural characteristics of the publications in this field and summarizes the research hotspots and trends in this field in recent years, aiming to understand the development status and trends in this field and inspire new ideas for researchers.

Details

International Journal of Intelligent Computing and Cybernetics, vol. 16 no. 1
Type: Research Article
ISSN: 1756-378X

Keywords

Article
Publication date: 3 July 2020

Azra Nazir, Roohie Naaz Mir and Shaima Qureshi

The trend of “Deep Learning for Internet of Things (IoT)” has gained fresh momentum with enormous upcoming applications employing these models as their processing engine and Cloud…

284

Abstract

Purpose

The trend of “Deep Learning for Internet of Things (IoT)” has gained fresh momentum with enormous upcoming applications employing these models as their processing engine and Cloud as their resource giant. But this picture leads to underutilization of ever-increasing device pool of IoT that has already passed 15 billion mark in 2015. Thus, it is high time to explore a different approach to tackle this issue, keeping in view the characteristics and needs of the two fields. Processing at the Edge can boost applications with real-time deadlines while complementing security.

Design/methodology/approach

This review paper contributes towards three cardinal directions of research in the field of DL for IoT. The first section covers the categories of IoT devices and how Fog can aid in overcoming the underutilization of millions of devices, forming the realm of the things for IoT. The second direction handles the issue of immense computational requirements of DL models by uncovering specific compression techniques. An appropriate combination of these techniques, including regularization, quantization, and pruning, can aid in building an effective compression pipeline for establishing DL models for IoT use-cases. The third direction incorporates both these views and introduces a novel approach of parallelization for setting up a distributed systems view of DL for IoT.

Findings

DL models are growing deeper with every passing year. Well-coordinated distributed execution of such models using Fog displays a promising future for the IoT application realm. It is realized that a vertically partitioned compressed deep model can handle the trade-off between size, accuracy, communication overhead, bandwidth utilization, and latency but at the expense of an additionally considerable memory footprint. To reduce the memory budget, we propose to exploit Hashed Nets as potentially favorable candidates for distributed frameworks. However, the critical point between accuracy and size for such models needs further investigation.

Originality/value

To the best of our knowledge, no study has explored the inherent parallelism in deep neural network architectures for their efficient distribution over the Edge-Fog continuum. Besides covering techniques and frameworks that have tried to bring inference to the Edge, the review uncovers significant issues and possible future directions for endorsing deep models as processing engines for real-time IoT. The study is directed to both researchers and industrialists to take on various applications to the Edge for better user experience.

Details

International Journal of Intelligent Computing and Cybernetics, vol. 13 no. 3
Type: Research Article
ISSN: 1756-378X

Keywords

1 – 10 of over 4000