Search results

1 – 6 of 6
Open Access
Article
Publication date: 22 October 2024

Sumit Kumar Maji and Sourav Prasad

Present bias (PB) is a cognitive bias that stimulates the individual decision-maker to favour the present reward even over the higher reward in the future to avoid the uncertainty…

Abstract

Purpose

Present bias (PB) is a cognitive bias that stimulates the individual decision-maker to favour the present reward even over the higher reward in the future to avoid the uncertainty attached to the reward in an uncertain future. The article attempts to examine the prevalence of PB amongst Indians and the effect of such bias on savings and borrowings.

Design/methodology/approach

Secondary data on 47,132 respondents from the Financial Inclusion Insights, 2017 database was used in the study. The theory of self-control, which is captured by the widely accepted hyperbolic discounting model, was used to explore the presence of PB. Suitable statistical techniques and the binary probit regression model were employed to attain the objectives of the study.

Findings

The prevalence of PB was found amongst 8.2% of the sample respondents. The outcome of the study endorses the view of previous researchers that present-biased people tend to save less and borrow more.

Originality/value

Although the exploration of the role of various cognitive biases on financial behaviour is gaining momentum in recent times, there is a dearth of studies exploring the prevalence of PB and its implication towards financial behaviour, especially in the context of the emerging economy of India. The study makes an original contribution in this regard by using a very rich dataset of 47,132 individuals in the Indian context for the first time.

Details

IIM Ranchi Journal of Management Studies, vol. 4 no. 1
Type: Research Article
ISSN: 2754-0138

Keywords

Book part
Publication date: 18 June 2020

Kallol Debnath and Kunal Debnath

In 2015, the Supreme Court of India directed the Government of India to confer the citizenship right to the Chakma refugees, who settled in North-Eastern States in India…

Abstract

In 2015, the Supreme Court of India directed the Government of India to confer the citizenship right to the Chakma refugees, who settled in North-Eastern States in India. Arunachal Pradesh, the former North Eastern Frontier Agency, holds a large number of Chakma refugees who had migrated to India from the erstwhile East Pakistan during the late 1960s. The present benevolent approach of the Government of India towards this ethno-refugee community is having domestic as well as external implication in the backdrop of rampant deportation of refugees from its neighbouring state, Bangladesh. Mere citizenship right may result in the administrative integration of the Chakmas but could not resolve their crises as alien versus indigenous debate intensifies the refugee crises today. Over the decades, political alienation of the Chakma refugees extended their sense of deprivation and marginalization. A separate perspective is required to assess the Chakmas’ claim that they are after all not alien to India since their ancestral land Chittagong Hill Tracts were under Indian territory and they have had a deep allegiance to this territory because of India's accommodative pluralistic outlook and multi-ethnic characters. Permanent means of livelihood, legal rights over land holding and bridging social capital would help ethnic integration, not merely ‘limited’ citizenship right. This study from ethno-political perspective would assess the crises of the Chakma refugees in Arunachal Pradesh in India.

Details

Refugee Crises and Third-World Economies
Type: Book
ISBN: 978-1-83982-191-2

Keywords

Article
Publication date: 21 July 2023

Ramkrishna Samanta, Jadab Munda, Sourav Mandal and Mihir Adhikary

Migration appears to be a determinant in health-care utilisation, particularly among the elderly in India. Ageing and migration are essential socio-demographic phenomena in the…

Abstract

Purpose

Migration appears to be a determinant in health-care utilisation, particularly among the elderly in India. Ageing and migration are essential socio-demographic phenomena in the 21st century for developing and developed countries to establish better public health-care policies. This study aims to focus on the status and determinants of health-care utilisation among elderly migrants who have migrated after attaining the age of 45 and above.

Design/methodology/approach

This study used the data from the first wave of the longitudinal ageing study in India (LASI) in 2017–2018. Two outcome variables were used to examine the health-care utilisation, including in-patient and out-patient care. Binary logistic regression was used to explore the predictors of healthcare utilisation in terms of in-patient and out-patient care among the elderly migrant population.

Findings

A total of 82.9% of elderly migrants had visited out-patient care when they were sick, whereas 15.3% have used in-patient care. Enabling factors, such as wealth quintile and health insurance, and need factor, such as chronic disease and self-rated health, were more significant factors influencing the health-care utilisation.

Originality/value

This study contributes to our understanding of older migrants’ health-care utilisation. Focussing on this study’s outcome, policymakers and decision makers may consider improving older migrants’ access to health-care by raising their income level, offering local health insurance and health awareness programs.

Details

International Journal of Migration, Health and Social Care, vol. 19 no. 2
Type: Research Article
ISSN: 1747-9894

Keywords

Article
Publication date: 8 January 2025

Jane Kelly Barbosa de Almeida, Rodrigo Sampaio Lopes and Marcele Elisa Fontana

This paper proposes a framework to assist in managing predictive maintenance by detecting progressive surface wear on spur gears through the analysis of digital images of gear…

Abstract

Purpose

This paper proposes a framework to assist in managing predictive maintenance by detecting progressive surface wear on spur gears through the analysis of digital images of gear teeth using computer vision (CV) techniques.

Design/methodology/approach

An experimental setup was constructed to capture images of gear teeth using endoscopic cameras. The images were selected, pre-processed, stored in a database and used in the experimental study of the proposed framework. Three CV techniques were explored within the framework for detecting wear in spur gears: (1) edge detection; (2) gray level co-occurrence matrix (GLCM) combined with machine learning (ML) algorithms and (3) deep learning with convolutional neural networks (CNN).

Findings

The results showed 85% accuracy using the edge detection algorithm. Among the ML algorithms, accuracy was above 60% for the support vector machine (SVM) and above 70% for K-nearest neighbors (KNN). Principal component analysis (PCA) indicated that as the distance between the principal components increased, it characterized the formation and progression of surface wear on the gear teeth. With the CNN, an accuracy of 99.999981% was achieved in the training loss rate, with a classification accuracy rate (CAR) of 91.6666%, an F1 score of 90.9090% and a recall of 83.3334% during the testing phase.

Practical implications

This framework is applicable to a variety of gear systems and industrial contexts requiring predictive maintenance, making it a highly scalable solution for industry professionals.

Originality/value

This paper proposes a novel framework that considers various CV techniques to detect and assess the level of wear on spur gear surfaces. Moreover, the results provide guidelines for selecting the most appropriate method for detecting wear in gear systems.

Details

International Journal of Quality & Reliability Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0265-671X

Keywords

Case study
Publication date: 28 September 2022

N.S. Padmanabhan, Smitha Siji and M.C. Minimol

This case facilitates the learning of marketing concepts like segmentation, targetting and positioning, marketing mix, branding strategies and digital marketing strategies.

Abstract

Theoretical basis

This case facilitates the learning of marketing concepts like segmentation, targetting and positioning, marketing mix, branding strategies and digital marketing strategies.

Research methodology

The case is written based on the facts available in the public domain and hence it follows secondary data research design. The secondary sources include company websites, industry reports, newspaper articles, social media sites and other online articles and reports. The case is classroom tested with MBA students in digital marketing course and PGDM students in brand management course.

Case overview/synopsis

Cycle Pure agarbathi, the leading brand of NR Group, became the coveted brand among the households of India. This success amidst high competition can be attributed to the concerted effort on product development coupled with mindful branding. To keep abreast of time and competition the company opted to go digital with an e-portal. Cycle Pure had a digital presence much earlier through social media, but the e-portal www.cycle.in, was a novel attempt. All the fragrance products of the brand were available for consumers through www.cycle.in. Moreover, the product assortment consisted of a collection of top-quality products and auxiliaries linked to multiple categories such as invocation necessities, personal care, air care and lifestyle. Furthermore, using in-house fragrance research lab, the company experimented with local aromas through numerous variants and also extended to related products such as sambrani (benzene) and dhoops. With consistent product augmentations along with access to innovative sectors such as air fresheners, the company expected to grow at a rate of 15%–16% annually. However, the company targeted to grab one-third share in the total market within the next five years.

Complexity academic level

This case can be used in Marketing Management, Brand Management, Digital marketing and Strategic Marketing courses at the Master’s level. It is suitable for MBA and executive MBA students.

Article
Publication date: 26 November 2024

Khaled Jamal Alrabea, Mohammad Alsaffar, Meshari Abdulhameed Alsafran, Ahmad Alsaber, Shihanah Almutairi, Farah Al-Saeed and Anwaar Mohammad Alkandari

By addressing the dearth of literature on the subject of cybersecurity risks and artificial intelligence (AI), this study aims to close a research gap by concentrating on the…

Abstract

Purpose

By addressing the dearth of literature on the subject of cybersecurity risks and artificial intelligence (AI), this study aims to close a research gap by concentrating on the ever-changing environment of online social networks (OSNs) and technology. The main goals are to classify cyberattacks into categories like malware, phishing/spam and network intrusion detection; to identify efficient algorithms for preventing cyber threats; to review relevant literature from 2019 to 2020; and to use machine learning algorithms to detect suspicious behavior related to malware. The study offers a novel framework that suggests particular machine learning algorithms for every kind of cyber threat, hence improving cybersecurity knowledge and reaction capacities. This makes the research useful for examining the impact of cybersecurity on smart cities.

Design/methodology/approach

Thirty papers have been examined on AI and machine learning algorithms, including K-nearest-neighbor (KNN), convolutional neural networks (CNN) and Random Forest (RF), that were published in 2019 and 2020. Using analytical software (NVivo), a qualitative approach is used to retrieve pertinent data from the chosen research. The researchers divide cyberattacks into three groups: network intrusion detection, phishing/spam and malware.

Findings

The study’s conclusions center on how AI and machine learning algorithms linked to cybersecurity are reviewed in the literature, how cyberattacks are classified and how an inventive framework for identifying and reducing risks is proposed. This makes the research useful for researching the implications of cybersecurity for smart cities.

Practical implications

The practical implications of this research are noteworthy, particularly in the realms of technology, AI, machine learning and innovation. The utilization of the NVivo technique enhances decision-making in uncertain situations, making the study’s results more reliable. The findings showcase the applicability of tools in analyzing malicious cyberattacks to address issues related to social media attacks, emphasizing their practical utility. The study’s relevance is further highlighted by a real-world example, where a Kuwaiti public sector fell victim to a malware attack, underlining the importance of cybersecurity measures aligned with the New Kuwait 2035 strategic development plan. The innovative framework presented in the research guides the selection of algorithms for detecting specific malicious attacks, offering practical insights for securing information technology (IT) infrastructure in Kuwait.

Social implications

The rapid digitization in Kuwait, accelerated by the COVID-19 pandemic, underscores the pivotal role of technology in government services. Ma’murov et al. (2023) emphasize the significance of digitization, particularly in accessing and verifying COVID-19 information. The call for a dedicated digital library for preserving pandemic-related material aligns with the evolving digital landscape. Cybersecurity emerges as a critical concern in Kuwait and the Gulf Cooperation Council (GCC), necessitating transnational cooperation (Nasser Alshabib and Tiago Martins, 2022). In the local context, the inefficiency of information security systems and low awareness among government employees pose cybersecurity challenges (Abdulkareem et al., 2014). Social media’s role during the pandemic highlights its significance, yet the need for cybersecurity in this domain remains underexplored (Ma’murov et al., 2023; Safi et al., 2023).

Originality/value

The unique aspect of the paper is its in-depth investigation of the relationship between cybersecurity and AI in OSNs. It uses a special application of machine learning methods, including CNN, RF and KNN, to identify suspicious behavior patterns linked to malware. The detailed analysis of 30 research papers released between 2019 and 2020, which informs the choice of suitable algorithms for diverse cyber threats, further emphasizes the study’s uniqueness. The novel framework that has been suggested categorizes assaults and suggests certain machine learning techniques for identification, offering a useful instrument to improve comprehension and reactions to a variety of cybersecurity issues.

Details

Journal of Science and Technology Policy Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2053-4620

Keywords

1 – 6 of 6