Search results

1 – 10 of 21
Article
Publication date: 16 October 2024

Geetha Krishnan and Raghuram J.N.V.

The study aims to examine diabetic patients’ switching intentions toward self-monitoring blood glucose devices, incorporating perceived usefulness and perceived ease of use, with…

Abstract

Purpose

The study aims to examine diabetic patients’ switching intentions toward self-monitoring blood glucose devices, incorporating perceived usefulness and perceived ease of use, with switching cost as a moderator.

Design/methodology/approach

A self-administered questionnaire was developed using established measuring scales. Data from 321 respondents was collected and analyzed using the partial least squares structural equation modeling approach.

Findings

Results indicate that perceived usefulness and perceived ease of use influence switching intention. Switching cost does not moderate the perceived usefulness, perceived ease of use and switching intention. This study reveals important information for healthcare practitioners and device manufacturers.

Originality/value

The significance and originality of this study stem from its pioneering investigation into the switching intentions of diabetic patients regarding self-monitoring glucose devices through the application of the technology acceptance model, thereby addressing a notable gap in the existing literature on diabetes management and technology adoption, which has lacked comprehensive examination of patients’ transition behaviors in this specific context.

Details

International Journal of Pharmaceutical and Healthcare Marketing, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1750-6123

Keywords

Article
Publication date: 14 January 2022

Sandeep Kumar Reddy Thota, C. Mala and Geetha Krishnan

A wireless body area network (WBAN) is a collection of sensing devices attached to a person’s body that is typically used during health care to track their physical state. This…

Abstract

Purpose

A wireless body area network (WBAN) is a collection of sensing devices attached to a person’s body that is typically used during health care to track their physical state. This paper aims to study the security challenges and various attacks that occurred while transferring a person’s sensitive medical diagnosis information in WBAN.

Design/methodology/approach

This technology has significantly gained prominence in the medical field. These wearable sensors are transferring information to doctors, and there are numerous possibilities for an intruder to pose as a doctor and obtain information about the patient’s vital information. As a result, mutual authentication and session key negotiations are critical security challenges for wearable sensing devices in WBAN. This work proposes an improved mutual authentication and key agreement protocol for wearable sensing devices in WBAN. The existing related schemes require more computational and storage requirements, but the proposed method provides a flexible solution with less complexity.

Findings

As sensor devices are resource-constrained, proposed approach only makes use of cryptographic hash-functions and bit-wise XOR operations, hence it is lightweight and flexible. The protocol’s security is validated using the AVISPA tool, and it will withstand various security attacks. The proposed protocol’s simulation and performance analysis are compared to current relevant schemes and show that it produces efficient outcomes.

Originality/value

This technology has significantly gained prominence in the medical sector. These sensing devises transmit information to doctors, and there are possibilities for an intruder to pose as a doctor and obtain information about the patient’s vital information. Hence, this paper proposes a lightweight and flexible protocol for mutual authentication and key agreement for wearable sensing devices in WBAN only makes use of cryptographic hash-functions and bit-wise XOR operations. The proposed protocol is simulated using AVISPA tool and its performance is better compared to the existing methods. This paper proposes a novel improved mutual authentication and key-agreement protocol for wearable sensing devices in WBAN.

Details

International Journal of Pervasive Computing and Communications, vol. 20 no. 4
Type: Research Article
ISSN: 1742-7371

Keywords

Content available
Article
Publication date: 1 March 2004

635

Abstract

Details

Industrial and Commercial Training, vol. 36 no. 2
Type: Research Article
ISSN: 0019-7858

Article
Publication date: 3 June 2014

Binli Wang and Yanguang Shen

Recently, with the rapid development of network, communications and computer technology, privacy preserving data mining (PPDM) has become an increasingly important research in the…

301

Abstract

Recently, with the rapid development of network, communications and computer technology, privacy preserving data mining (PPDM) has become an increasingly important research in the field of data mining. In distributed environment, how to protect data privacy while doing data mining jobs from a large number of distributed data is more far-researching. This paper describes current research of PPDM at home and abroad. Then it puts emphasis on classifying the typical uses and algorithms of PPDM in distributed environment, and summarizing their advantages and disadvantages. Furthermore, it points out the future research directions in the field.

Details

World Journal of Engineering, vol. 11 no. 2
Type: Research Article
ISSN: 1708-5284

Keywords

Article
Publication date: 30 August 2024

Saeed Aldulaimi, Swati Soni, Isha Kampoowale, Gopala Krishnan, Mohd Shukri Ab Yajid, Ali Khatibi, Deepak Minhas and Meenu Khurana

Drawing from stakeholder (ST) and social exchange theory (SET), the purpose of this study is to examine the relationship between customer perceived ethicality (CPE), electronic…

Abstract

Purpose

Drawing from stakeholder (ST) and social exchange theory (SET), the purpose of this study is to examine the relationship between customer perceived ethicality (CPE), electronic word of mouth (eWOM), customer trust (CT) and customer loyalty (CL). Furthermore, this study aimed to understand the dual role of CPE and eWOM in obtaining CT and achieving CL.

Design/methodology/approach

Using a quantitative, cross-sectional research design, data were collected from face-to-face surveys, yielding 358 responses. The partial least square algorithm was used to test the proposed hypothesis.

Findings

The analysis revealed that CPE and eWOM positively affect CT and CL, and CT has a mediating effect on the association between CPE–CL and eWOM–CL. CT was also found to positively affect CL.

Practical implications

Hotel managers can prioritize ethical practices and leverage the power of eWOM to build trust and achieve loyalty. This integrated approach not only enhances customer satisfaction and retention but also creates a competitive advantage.

Originality/value

The novelty of this study lies in the investigation of the dual role played by CPE and eWOM as antecedents of CT and CL within the hotel industry. Finally, this study explains the drivers of CT and CL, thereby making a novel contribution to the literature.

Details

International Journal of Ethics and Systems, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2514-9369

Keywords

Content available
Article
Publication date: 29 October 2014

8

Abstract

Details

Gender in Management: An International Journal, vol. 29 no. 8
Type: Research Article
ISSN: 1754-2413

Article
Publication date: 7 May 2024

Swathi Pennapareddy, Ramprasad Srinivasan and Natarajan K.

Automatic dependent surveillance-broadcast (ADS-B) is the foundational technology of the next generation air transportation system defined by Federal Aviation Authority and is one…

Abstract

Purpose

Automatic dependent surveillance-broadcast (ADS-B) is the foundational technology of the next generation air transportation system defined by Federal Aviation Authority and is one of the most precise ways for tracking aircraft position. ADS-B is intended to provide greater situational awareness to the pilots by displaying the traffic information like aircraft ID, altitude, speed and other critical parameters on the Cockpit Display of Traffic Information displays in the cockpit. Unfortunately, due to the initial proposed nature of ADS-B protocol, it is neither encrypted nor has any other innate security mechanisms, which makes it an easy target for malicious attacks. The system is vulnerable to various active and passive attacks like message ingestion, message deletion, eavesdropping, jamming, etc., which has become an area of concern for the aviation industry. The purpose of this study is to propose a method based on modified advanced encryption standard (AES) algorithm to secure the ADS=B messages and increase the integrity of ADS-B data transmissions.

Design/methodology/approach

Though there are various cryptographic and non-cryptographic methods proposed to secure ADS-B data transmissions, it is evident that most of these systems have limitations in terms of cost, implementation or feasibility. The new proposed method implements AES encryption techniques on the ADS-B data on the sender side and correlated decryption mechanism at the receiver end. The system is designed based on the flight schedule data available from any flight planning systems and implementing the AES algorithm on the ADS-B data from each aircraft in the flight schedule.

Findings

The suitable hardware was developed using Raspberry pi, ESP32 and Ra-02. Several runs were done to verify the original message, transmitted data and received data. During transmission, encryption algorithm was being developed, which has got very high secured transmission, and during the reception, the data was secured. Field test was conducted to validate the transmission and quality. Several trials were done to validate the transmission process. The authors have successfully shown that the ADS-B data can be encrypted using AES algorithm. The authors are successful in transmitting and receiving the ADS-B data packet using the discussed hardware and software methodology. One major advantage of using the proposed solution is that the information received is encrypted, and the receiver ADS-B system can decrypt the messages on the receiving end. This clearly proves that when the data is received by an unknown receiver, the messages cannot be decrypted, as the receiver is not capable of decrypting the AES-authenticated messages transmitted by the authenticated source. Also, AES encryption is highly unlikely to be decrypted if the encryption key and the associated decryption key are not known.

Research limitations/implications

Implementation of the developed solution in actual onboard avionics systems is not within the scope of this research. Hence, assessing in the real-time distances is not covered.

Social implications

The authors propose to extend this as a software solution to the onboard avionics systems by considering the required architectural changes. This solution can also bring in positive results for unmanned air vehicles in addition to the commercial aircrafts. Enhancement of security to the key operational and navigation data elements is going to be invaluable for future air traffic management and saving lives of people.

Originality/value

The proposed solution has been practically implemented by developing the hardware and software as part of this research. This has been clearly brought out in the paper. The implementation has been tested using the actual ADS-B data/messages received from using the ADS-B receiver. The solution works perfectly, and this brings immense value to the aircraft-to-aircraft and aircraft-to-ground communications, specifically while using ADS-B data for communicating the position information. With the proposed architecture and minor software updates to the onboard avionics, this solution can enhance safety of flights.

Details

Aircraft Engineering and Aerospace Technology, vol. 96 no. 7
Type: Research Article
ISSN: 1748-8842

Keywords

Article
Publication date: 6 November 2017

Jayashree Bhattacharjee and Ranjit Singh

The purpose of this paper is to systematically review the literature published on the various aspects of awareness about equity investment. The paper highlights the major issues…

1628

Abstract

Purpose

The purpose of this paper is to systematically review the literature published on the various aspects of awareness about equity investment. The paper highlights the major issues and aspects with respect to equity investment awareness. It also aims to raise specific questions for future research.

Design/methodology/approach

The study is based on secondary information collected primarily through the review of existing literature.

Findings

It is found that the important determinants of equity awareness are demographic, socio-economic and psychological factors. Financial well-being is attributable largely to financial awareness. Growth of the financial market can be credited to equity awareness. Equity awareness enables an investor to make better financial decisions, to appreciate their rights and responsibilities and to understand and manage the risk as an investor.

Practical implications

Policy makers can design the equity awareness campaign considering the different demographic and socio-economic factors. While designing such a campaign, the impact and importance of equity awareness should be illustrated, considering their demographic and socio-economic profile.

Originality/value

This study is the first one using the literature review method in the area of equity investment awareness, in particular, and financial awareness in general. This paper will be useful to researchers, academicians and those working in the area of equity investment awareness and in their understanding about the various aspects of awareness about equity investment. The paper is first of its kind, hence original in nature.

Details

Qualitative Research in Financial Markets, vol. 9 no. 4
Type: Research Article
ISSN: 1755-4179

Keywords

Article
Publication date: 28 August 2024

Afshar Bazyar, Morteza Abbasi and Shayan Naghdi Khanachah

This research aims to investigate the impact of servant leadership on knowledge management and its subsequent connection to cost-saving innovation. The study further explored…

Abstract

Purpose

This research aims to investigate the impact of servant leadership on knowledge management and its subsequent connection to cost-saving innovation. The study further explored these relationships by examining the mediating roles of innovation capabilities and technological volatility.

Design/methodology/approach

The research is applied in purpose and employs a descriptive-survey method for data collection. It follows a qualitative-quantitative approach, utilizing expert interviews in the qualitative phase. The sample consists of 35 managers and expert professors with knowledge management experience in universities and high-tech industries, selected through the snowball method. Data collected from Iranian organizations were analyzed using AMOS software.

Findings

The results revealed a positive correlation between servant leadership and knowledge management. Knowledge management demonstrated a significant positive relationship with cost-saving innovation. Additionally, technological volatility and innovation capabilities were identified as crucial factors influencing the connection between knowledge management and innovation, particularly in promoting frugality.

Originality/value

While this research provides a comprehensive model, it acknowledges specific limitations that warrant further investigation. The study predominantly focused on Iranian organizations, suggesting an opportunity to broaden its scope to include diverse organizational perspectives from various cultural and geographical contexts. Moreover, a promising avenue for future research involves exploring entrepreneurial orientation as a potential mediating variable. Given its significant impact on organizational dynamics, introducing entrepreneurial orientation could enhance our understanding of its effects on both knowledge management and the promotion of frugal innovation. This expansion may illuminate the intricate interplay between entrepreneurial orientation, knowledge processes and innovative practices, contributing to a more sophisticated discussion on effective organizational strategies.

Details

Journal of Science and Technology Policy Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2053-4620

Keywords

Book part
Publication date: 2 August 2023

Premalatha Karupiah

This chapter explores the presentation of women's violence in Tamil mega serials. Tamil mega serials are produced in India and aired six days a week on satellite television…

Abstract

This chapter explores the presentation of women's violence in Tamil mega serials. Tamil mega serials are produced in India and aired six days a week on satellite television channels. The story revolves around households with extended families living together and issues affecting women such as family well-being, motherhood and fertility. Women mostly take the role of the main protagonist and antagonist in Tamil serials. This chapter analyses the presentation of violence in 10 episodes of Chandralekha, a Tamil mega serial. Perpetrators of violence in Tamil serials are mainly female antagonists and other characters supporting the antagonists. The rivalry between the protagonist and antagonist centres around the struggle for property or the love of or marriage with a man. The type of violence ranges from mild to severe kinds of physical violence, and non-physical violence. The presentation of violence in Tamil serials reflects gender inequality in society. The meaning of some forms of violence in mega serials is closely related to the traditional gender roles and notion of traditional femininity in society.

Details

The Emerald International Handbook of Feminist Perspectives on Women’s Acts of Violence
Type: Book
ISBN: 978-1-80382-255-6

Keywords

1 – 10 of 21