Pub Date : 2023-05-02DOI: 10.1108/ijieom-12-2022-0071
J. Quiroz-Flores, Renato Jose Aguado-Rodriguez, Edisson Andree Zegarra-Aguinaga, Martin Collao-Diaz, A. Flores-Perez
PurposeThis paper aims to find the best tools to influence the improvement of sustainability in food supply chains (FSCs) by conducting a systematic review of articles. The reader will learn how the different industry 4.0 tools (I4.0T) benefit the FSC and the limitations of each tool.Design/methodology/approachA review of 436 articles published during the period 2019 to 2022 referenced in the Scopus and Web of Science databases was performed. The review was limited to articles published in English and directly related to Industry 4.0, circular economy and sustainability in the food supply chain.FindingsThe results show different contributions of I4.0, with some being more influential than others in improving sustainability in FSCs; for example, Internet of Things and Blockchain have been shown to contribute more toward transparency, traceability, process optimization and waste reduction.Originality/valueThe paper's contribution consisted of ranking according to their importance and the I4.0T that affect sustainability in FSCs by classifying the aspects of each tool and the sustainability factors through a categorization by the Analysis Hierarchy Process.
本文旨在通过对相关文章的系统回顾,找到影响食品供应链(FSCs)可持续性改善的最佳工具。读者将了解不同的工业4.0工具(I4.0T)如何使FSC受益,以及每种工具的局限性。设计/方法/方法对Scopus和Web of Science数据库中2019年至2022年期间发表的436篇文章进行了回顾。该综述仅限于以英文发表的与工业4.0、循环经济和食品供应链可持续性直接相关的文章。结果表明,I4.0对FSCs可持续性的贡献各不相同,其中一些对FSCs可持续性的影响更大;例如,物联网和区块链已被证明对透明度、可追溯性、流程优化和减少浪费做出了更大的贡献。本文的贡献包括根据其重要性和影响fsc可持续性的I4.0T进行排名,通过对每个工具的各个方面进行分类,并通过层次分析法对可持续性因素进行分类。
{"title":"Industry 4.0, circular economy and sustainability in the food industry: a literature review","authors":"J. Quiroz-Flores, Renato Jose Aguado-Rodriguez, Edisson Andree Zegarra-Aguinaga, Martin Collao-Diaz, A. Flores-Perez","doi":"10.1108/ijieom-12-2022-0071","DOIUrl":"https://doi.org/10.1108/ijieom-12-2022-0071","url":null,"abstract":"PurposeThis paper aims to find the best tools to influence the improvement of sustainability in food supply chains (FSCs) by conducting a systematic review of articles. The reader will learn how the different industry 4.0 tools (I4.0T) benefit the FSC and the limitations of each tool.Design/methodology/approachA review of 436 articles published during the period 2019 to 2022 referenced in the Scopus and Web of Science databases was performed. The review was limited to articles published in English and directly related to Industry 4.0, circular economy and sustainability in the food supply chain.FindingsThe results show different contributions of I4.0, with some being more influential than others in improving sustainability in FSCs; for example, Internet of Things and Blockchain have been shown to contribute more toward transparency, traceability, process optimization and waste reduction.Originality/valueThe paper's contribution consisted of ranking according to their importance and the I4.0T that affect sustainability in FSCs by classifying the aspects of each tool and the sustainability factors through a categorization by the Analysis Hierarchy Process.","PeriodicalId":268888,"journal":{"name":"International Journal of Industrial Engineering and Operations Management","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116785624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-04-28DOI: 10.1108/ijieom-01-2023-0011
Prudence Kadebu, Robert T. R. Shoniwa, Kudakwashe Zvarevashe, Addlight Mukwazvure, Innocent Mapanga, N. F. Thusabantu, T. T. Gotora
PurposeGiven how smart today’s malware authors have become through employing highly sophisticated techniques, it is only logical that methods be developed to combat the most potent threats, particularly where the malware is stealthy and makes indicators of compromise (IOC) difficult to detect. After the analysis is completed, the output can be employed to detect and then counteract the attack. The goal of this work is to propose a machine learning approach to improve malware detection by combining the strengths of both supervised and unsupervised machine learning techniques. This study is essential as malware has certainly become ubiquitous as cyber-criminals use it to attack systems in cyberspace. Malware analysis is required to reveal hidden IOC, to comprehend the attacker’s goal and the severity of the damage and to find vulnerabilities within the system.Design/methodology/approachThis research proposes a hybrid approach for dynamic and static malware analysis that combines unsupervised and supervised machine learning algorithms and goes on to show how Malware exploiting steganography can be exposed.FindingsThe tactics used by malware developers to circumvent detection are becoming more advanced with steganography becoming a popular technique applied in obfuscation to evade mechanisms for detection. Malware analysis continues to call for continuous improvement of existing techniques. State-of-the-art approaches applying machine learning have become increasingly popular with highly promising results.Originality/valueCyber security researchers globally are grappling with devising innovative strategies to identify and defend against the threat of extremely sophisticated malware attacks on key infrastructure containing sensitive data. The process of detecting the presence of malware requires expertise in malware analysis. Applying intelligent methods to this process can aid practitioners in identifying malware’s behaviour and features. This is especially expedient where the malware is stealthy, hiding IOC.
{"title":"A hybrid machine learning approach for analysis of stegomalware","authors":"Prudence Kadebu, Robert T. R. Shoniwa, Kudakwashe Zvarevashe, Addlight Mukwazvure, Innocent Mapanga, N. F. Thusabantu, T. T. Gotora","doi":"10.1108/ijieom-01-2023-0011","DOIUrl":"https://doi.org/10.1108/ijieom-01-2023-0011","url":null,"abstract":"PurposeGiven how smart today’s malware authors have become through employing highly sophisticated techniques, it is only logical that methods be developed to combat the most potent threats, particularly where the malware is stealthy and makes indicators of compromise (IOC) difficult to detect. After the analysis is completed, the output can be employed to detect and then counteract the attack. The goal of this work is to propose a machine learning approach to improve malware detection by combining the strengths of both supervised and unsupervised machine learning techniques. This study is essential as malware has certainly become ubiquitous as cyber-criminals use it to attack systems in cyberspace. Malware analysis is required to reveal hidden IOC, to comprehend the attacker’s goal and the severity of the damage and to find vulnerabilities within the system.Design/methodology/approachThis research proposes a hybrid approach for dynamic and static malware analysis that combines unsupervised and supervised machine learning algorithms and goes on to show how Malware exploiting steganography can be exposed.FindingsThe tactics used by malware developers to circumvent detection are becoming more advanced with steganography becoming a popular technique applied in obfuscation to evade mechanisms for detection. Malware analysis continues to call for continuous improvement of existing techniques. State-of-the-art approaches applying machine learning have become increasingly popular with highly promising results.Originality/valueCyber security researchers globally are grappling with devising innovative strategies to identify and defend against the threat of extremely sophisticated malware attacks on key infrastructure containing sensitive data. The process of detecting the presence of malware requires expertise in malware analysis. Applying intelligent methods to this process can aid practitioners in identifying malware’s behaviour and features. This is especially expedient where the malware is stealthy, hiding IOC.","PeriodicalId":268888,"journal":{"name":"International Journal of Industrial Engineering and Operations Management","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126840485","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
PurposeIn response to food supply constraints resulting from coronavirus disease 2019 (COVID-19) restrictions, in the year 2020, the project developed automated household Aquaponics units to guarantee food self-sufficiency. However, the automated aquaponics solution did not fully comply with data privacy and portability best practices to protect the data of household owners. The purpose of this study is to develop a data privacy and portability layer on top of the previously developed automated Aquaponics units.Design/methodology/approachDesign Science Research (DSR) is the research method implemented in this study.FindingsGeneral Data Protection and Privacy Regulations (GDPR)-inspired principles empowering data subjects including data minimisation, purpose limitation, storage limitation as well as integrity and confidentiality can be implemented in a federated learning (FL) architecture using Pinecone Matrix home servers and edge devices.Research limitations/implicationsThe literature reviewed for this study demonstrates that the GDPR right to data portability can have a positive impact on data protection by giving individuals more control over their own data. This is achieved by allowing data subjects to obtain their personal information from a data controller in a format that makes it simple to reuse it in another context and to transmit this information freely to any other data controller of their choice. Data portability is not strictly governed or enforced by data protection laws in the developing world, such as Zimbabwe's Data Protection Act of 2021.Practical implicationsPrivacy requirements can be implemented in end-point technology such as smartphones, microcontrollers and single board computer clusters enabling data subjects to be incentivised whilst unlocking the value of their own data in the process fostering competition among data controllers and processors.Originality/valueThe use of end-to-end encryption with Matrix Pinecone on edge endpoints and fog servers, as well as the practical implementation of data portability, are currently not adequately covered in the literature. The study acts as a springboard for a future conversation on the topic.
{"title":"A privacy-preserving federated learning architecture implementing data ownership and portability on edge end-points","authors":"Patience Mpofu, Solomon Hopewell Kembo, Marlvern Chimbwanda, Saulo Jacques, Nevil Chitiyo, Kudakwashe Zvarevashe","doi":"10.1108/ijieom-02-2023-0020","DOIUrl":"https://doi.org/10.1108/ijieom-02-2023-0020","url":null,"abstract":"PurposeIn response to food supply constraints resulting from coronavirus disease 2019 (COVID-19) restrictions, in the year 2020, the project developed automated household Aquaponics units to guarantee food self-sufficiency. However, the automated aquaponics solution did not fully comply with data privacy and portability best practices to protect the data of household owners. The purpose of this study is to develop a data privacy and portability layer on top of the previously developed automated Aquaponics units.Design/methodology/approachDesign Science Research (DSR) is the research method implemented in this study.FindingsGeneral Data Protection and Privacy Regulations (GDPR)-inspired principles empowering data subjects including data minimisation, purpose limitation, storage limitation as well as integrity and confidentiality can be implemented in a federated learning (FL) architecture using Pinecone Matrix home servers and edge devices.Research limitations/implicationsThe literature reviewed for this study demonstrates that the GDPR right to data portability can have a positive impact on data protection by giving individuals more control over their own data. This is achieved by allowing data subjects to obtain their personal information from a data controller in a format that makes it simple to reuse it in another context and to transmit this information freely to any other data controller of their choice. Data portability is not strictly governed or enforced by data protection laws in the developing world, such as Zimbabwe's Data Protection Act of 2021.Practical implicationsPrivacy requirements can be implemented in end-point technology such as smartphones, microcontrollers and single board computer clusters enabling data subjects to be incentivised whilst unlocking the value of their own data in the process fostering competition among data controllers and processors.Originality/valueThe use of end-to-end encryption with Matrix Pinecone on edge endpoints and fog servers, as well as the practical implementation of data portability, are currently not adequately covered in the literature. The study acts as a springboard for a future conversation on the topic.","PeriodicalId":268888,"journal":{"name":"International Journal of Industrial Engineering and Operations Management","volume":"173 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114608673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
PurposeCoronavirus Disease 2019 (COVID-19) necessitated the need for “Hospital-at-home” improvisations that involve wearable technology to classify patients within households before visiting health institutions. Do-It-Yourself wearable devices allow for the collection of health data leading to the detection and/or prediction of the prevalence of the disease. The sensitive nature of health data requires safeguards to ensure patients’ privacy is not violated. The previous work utilized Hyperledger Fabric to verify transmitted data within Smart Homes, allowing for the possible implementation of legal restrictions through smart contracts in the future. This study aims to explore privacy-enhancing authentication schemes that are operated by multiple credential issuers and capable of integration into the Hyperledger ecosystem.Design/methodology/approachDesign Science Research is the methodology that was used in this study. An architecture for ABC-privacy was developed and evaluated.FindingsWhile the privacy-by-design architecture enhances data privacy through edge and fog computing architecture, there is a need to provide an additional privacy layer that limits the amount of data that patients disclose. Selective disclosure of credentials limits the number of information patients or devices divulge.Originality/valueThe evaluation of this study identified Coconut as the most suitable attribute-based credentials scheme for the Smart Homes Patients and Health Wearables use case Coconut user-centric architecture Hyperledger integration multi-party threshold authorities public and private attributes re-randomization and unlinkable revelation of selective attribute revelations.
{"title":"Patient and wearable device authentication utilizing attribute-based credentials and permissioned blockchains in smart homes","authors":"Solomon Hopewell Kembo, Patience Mpofu, Saulo Jacques, Nevil Chitiyo, B. Mukorera","doi":"10.1108/ijieom-02-2023-0021","DOIUrl":"https://doi.org/10.1108/ijieom-02-2023-0021","url":null,"abstract":"PurposeCoronavirus Disease 2019 (COVID-19) necessitated the need for “Hospital-at-home” improvisations that involve wearable technology to classify patients within households before visiting health institutions. Do-It-Yourself wearable devices allow for the collection of health data leading to the detection and/or prediction of the prevalence of the disease. The sensitive nature of health data requires safeguards to ensure patients’ privacy is not violated. The previous work utilized Hyperledger Fabric to verify transmitted data within Smart Homes, allowing for the possible implementation of legal restrictions through smart contracts in the future. This study aims to explore privacy-enhancing authentication schemes that are operated by multiple credential issuers and capable of integration into the Hyperledger ecosystem.Design/methodology/approachDesign Science Research is the methodology that was used in this study. An architecture for ABC-privacy was developed and evaluated.FindingsWhile the privacy-by-design architecture enhances data privacy through edge and fog computing architecture, there is a need to provide an additional privacy layer that limits the amount of data that patients disclose. Selective disclosure of credentials limits the number of information patients or devices divulge.Originality/valueThe evaluation of this study identified Coconut as the most suitable attribute-based credentials scheme for the Smart Homes Patients and Health Wearables use case Coconut user-centric architecture Hyperledger integration multi-party threshold authorities public and private attributes re-randomization and unlinkable revelation of selective attribute revelations.","PeriodicalId":268888,"journal":{"name":"International Journal of Industrial Engineering and Operations Management","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129232769","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-03-09DOI: 10.1108/ijieom-10-2022-0045
Rahmi Yuniarti, I. Masudin, A. Rusdiansyah, D. Handayani
PurposeThis study aimed to develop the integration of the multiperiod production-distribution model in a closed-loop supply chain involving carbon emission and traceability. The developed model was for agricultural food (agri-food) products, considering the reverse flow of food waste from the disposal center (composting center) to producers.FindingsThe results indicate that integrating the production and distribution model considering food waste recycling provides low carbon emissions in lower total costs. The sensitivity analysis also found that there are trade-offs between production and distribution rate and food waste levels on carbon emission and traceability.Research limitations/implicationsThis study focuses on the mathematical modeling of a multiperiod production-distribution formulation for a closed-loop supply chain.Originality/valueThe model of the agri-food closed-loop supply chain in this study that considers food recycling and carbon emissions would help stakeholders involved in the agri-food supply chain to reduce food waste and carbon emissions.
{"title":"Model of multiperiod production-distribution for closed-loop supply chain considering carbon emission and traceability for agri-food products","authors":"Rahmi Yuniarti, I. Masudin, A. Rusdiansyah, D. Handayani","doi":"10.1108/ijieom-10-2022-0045","DOIUrl":"https://doi.org/10.1108/ijieom-10-2022-0045","url":null,"abstract":"PurposeThis study aimed to develop the integration of the multiperiod production-distribution model in a closed-loop supply chain involving carbon emission and traceability. The developed model was for agricultural food (agri-food) products, considering the reverse flow of food waste from the disposal center (composting center) to producers.FindingsThe results indicate that integrating the production and distribution model considering food waste recycling provides low carbon emissions in lower total costs. The sensitivity analysis also found that there are trade-offs between production and distribution rate and food waste levels on carbon emission and traceability.Research limitations/implicationsThis study focuses on the mathematical modeling of a multiperiod production-distribution formulation for a closed-loop supply chain.Originality/valueThe model of the agri-food closed-loop supply chain in this study that considers food recycling and carbon emissions would help stakeholders involved in the agri-food supply chain to reduce food waste and carbon emissions.","PeriodicalId":268888,"journal":{"name":"International Journal of Industrial Engineering and Operations Management","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116925564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
PurposeEco-innovation is emerging as one of the most important constructs that improve environmental sustainability of firms. However, it has been shown that companies alone cannot adequately develop eco-innovation activities, which is why they require the implementation of external collaboration activities with intermediaries, suppliers and stakeholders to achieve a higher level of eco-innovation activities and improve business performance of manufacturing firms. Therefore, this research fills this gap by exploring the importance of the relationship between collaboration and eco-innovation.Design/methodology/approachThe research is conducted through an extensive literature review with a research model consisting of 5 measurement scales, 24 items and 4 hypotheses. A self-administered questionnaire was distributed to a sample of 460 firms in Mexico, analyzing the data set through confirmatory factor analysis and structural equation models.FindingsThe results obtained from this study suggest that collaboration has significant positive effects both on the eco-innovation of products, processes and management, as well as on the business performance of companies in the automotive industry.Practical implicationsThe findings of this study have important implications both for the public administration (e.g. development of policies to support companies and financing programs) and for the managers of companies in the automotive industry (e.g. training program for employees and collaboration with other firms).Originality/valueThis paper fills a research gap by expanding the limited body of knowledge that relates collaboration eco-innovation and business performance, which is why this research aims to fill this existing gap in the literature and explore the relationship between collaboration, eco-innovation and business performance.
{"title":"Collaboration, eco-innovation and economic performance in the automotive industry","authors":"Gonzalo Maldonado Guzmám, Sandra Yesenia Pinzón Castro","doi":"10.1108/ijieom-09-2022-0041","DOIUrl":"https://doi.org/10.1108/ijieom-09-2022-0041","url":null,"abstract":"PurposeEco-innovation is emerging as one of the most important constructs that improve environmental sustainability of firms. However, it has been shown that companies alone cannot adequately develop eco-innovation activities, which is why they require the implementation of external collaboration activities with intermediaries, suppliers and stakeholders to achieve a higher level of eco-innovation activities and improve business performance of manufacturing firms. Therefore, this research fills this gap by exploring the importance of the relationship between collaboration and eco-innovation.Design/methodology/approachThe research is conducted through an extensive literature review with a research model consisting of 5 measurement scales, 24 items and 4 hypotheses. A self-administered questionnaire was distributed to a sample of 460 firms in Mexico, analyzing the data set through confirmatory factor analysis and structural equation models.FindingsThe results obtained from this study suggest that collaboration has significant positive effects both on the eco-innovation of products, processes and management, as well as on the business performance of companies in the automotive industry.Practical implicationsThe findings of this study have important implications both for the public administration (e.g. development of policies to support companies and financing programs) and for the managers of companies in the automotive industry (e.g. training program for employees and collaboration with other firms).Originality/valueThis paper fills a research gap by expanding the limited body of knowledge that relates collaboration eco-innovation and business performance, which is why this research aims to fill this existing gap in the literature and explore the relationship between collaboration, eco-innovation and business performance.","PeriodicalId":268888,"journal":{"name":"International Journal of Industrial Engineering and Operations Management","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129043312","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-02-28DOI: 10.1108/ijieom-10-2022-0056
M. Ba-Aoum, Niyousha Hosseinichimeh, K. Triantis, K. Pasupathy, M. Sir, D. Nestler
PurposePatient length of stay (LOS) is an important indicator of emergency department (ED) performance. Investigating factors that influence LOS could thus improve healthcare delivery and patient safety. Previous studies have focused on patient-level factors to explain LOS variation, with little research into service-related factors. This study examined the association between LOS and multi-level factors including patient-, service- and organization-level factors.Design/methodology/approachThis study uses a retrospective observational design to identify a cohort of patients from arrival to discharge from ED. A year-long data regarding patients flow trhoguh ED were analyzed using analytics techniques and multi-regression models. The response variable was patient LOS, and the independent variables were patient characteristics, service-related factors and organizational variables.FindingsThe findings of this study showed that older patients, middle triage and hospitalization were all associated with longer LOS. Service-related factors such as complexity of care provided, initial ward designation and ward transfer had a significant impact as well. Finally, prolonged LOS was associated with a higher ratio of patients per medical doctor and per nurse. In contrast, a higher number of residents in the ED were associated with longer patient LOS.Originality/valuePrevious studies on patient LOS have focused on patient-level factors, with little research on service-related factors. This study has addressed that gap by examining the association between LOS and multi-level factors including patient-, service- and organization-level factors. Patient-level factors included demographics, acuity, arrival shift, arrival mode and discharge type. Service-level factors consisted of first ward, ward transfer and complexity of care provided. Organizational factors consisted of three ratios: patients per MD, patients per nurse and patients per resident. The results add to the current understanding of factors that increase patient LOS in EDs and contribute to the body of knowledge on ED performance, operation management and quality of care. The study also provides practical and managerial insights that could be used to improve patient flow in EDs and reduce LOS.
{"title":"Statistical analysis of factors influencing patient length of stay in emergency departments","authors":"M. Ba-Aoum, Niyousha Hosseinichimeh, K. Triantis, K. Pasupathy, M. Sir, D. Nestler","doi":"10.1108/ijieom-10-2022-0056","DOIUrl":"https://doi.org/10.1108/ijieom-10-2022-0056","url":null,"abstract":"PurposePatient length of stay (LOS) is an important indicator of emergency department (ED) performance. Investigating factors that influence LOS could thus improve healthcare delivery and patient safety. Previous studies have focused on patient-level factors to explain LOS variation, with little research into service-related factors. This study examined the association between LOS and multi-level factors including patient-, service- and organization-level factors.Design/methodology/approachThis study uses a retrospective observational design to identify a cohort of patients from arrival to discharge from ED. A year-long data regarding patients flow trhoguh ED were analyzed using analytics techniques and multi-regression models. The response variable was patient LOS, and the independent variables were patient characteristics, service-related factors and organizational variables.FindingsThe findings of this study showed that older patients, middle triage and hospitalization were all associated with longer LOS. Service-related factors such as complexity of care provided, initial ward designation and ward transfer had a significant impact as well. Finally, prolonged LOS was associated with a higher ratio of patients per medical doctor and per nurse. In contrast, a higher number of residents in the ED were associated with longer patient LOS.Originality/valuePrevious studies on patient LOS have focused on patient-level factors, with little research on service-related factors. This study has addressed that gap by examining the association between LOS and multi-level factors including patient-, service- and organization-level factors. Patient-level factors included demographics, acuity, arrival shift, arrival mode and discharge type. Service-level factors consisted of first ward, ward transfer and complexity of care provided. Organizational factors consisted of three ratios: patients per MD, patients per nurse and patients per resident. The results add to the current understanding of factors that increase patient LOS in EDs and contribute to the body of knowledge on ED performance, operation management and quality of care. The study also provides practical and managerial insights that could be used to improve patient flow in EDs and reduce LOS.","PeriodicalId":268888,"journal":{"name":"International Journal of Industrial Engineering and Operations Management","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130130984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-02-20DOI: 10.1108/ijieom-12-2022-0068
Nuh Keleş
PurposeThis study aims to apply new modifications by changing the nonlinear logarithmic calculation steps in the method based on the removal effects of criteria (MEREC) method. Geometric and harmonic mean from multiplicative functions is used for the modifications made while extracting the effects of the criteria on the overall performance one by one. Instead of the nonlinear logarithmic measure used in the MEREC method, it is desired to obtain results that are closer to the mean and have a lower standard deviation.Design/methodology/approachThe MEREC method is based on the removal effects of the criteria on the overall performance. The method uses a logarithmic measure with a nonlinear function. MEREC-G using geometric mean and MEREC-H using harmonic mean are introduced in this study. The authors compared the MEREC method, its modifications and some other objective weight determination methods.FindingsMEREC-G and MEREC-H variants, which are modifications of the MEREC method, are shown to be effective in determining the objective weights of the criteria. Findings of the MEREC-G and MEREC-H variants are more convenient, simpler, more reasonable, closer to the mean and have fewer deviations. It was determined that the MEREC-G variant gave more compatible findings with the entropy method.Practical implicationsDecision-making can occur at any time in any area of life. There are various criteria and alternatives for decision-making. In multi-criteria decision-making (MCDM) models, it is a very important distinction to determine the criteria weights for the selection/ranking of the alternatives. The MEREC method can be used to find more reasonable or average results than other weight determination methods such as entropy. It can be expected that the MEREC method will be more used in daily life problems and various areas.Originality/valueObjective weight determination methods evaluate the weights of the criteria according to the scores of the determined alternatives. In this study, the MEREC method, which is an objective weight determination method, has been expanded. Although a nonlinear measurement model is used in the literature, the contribution was made in this study by using multiplicative functions. As an important originality, the authors demonstrated the effect of removing criteria in the MEREC method in a sensitivity analysis by actually removing the alternatives one by one from the model.
{"title":"Measuring performances through multiplicative functions by modifying the MEREC method: MEREC-G and MEREC-H","authors":"Nuh Keleş","doi":"10.1108/ijieom-12-2022-0068","DOIUrl":"https://doi.org/10.1108/ijieom-12-2022-0068","url":null,"abstract":"PurposeThis study aims to apply new modifications by changing the nonlinear logarithmic calculation steps in the method based on the removal effects of criteria (MEREC) method. Geometric and harmonic mean from multiplicative functions is used for the modifications made while extracting the effects of the criteria on the overall performance one by one. Instead of the nonlinear logarithmic measure used in the MEREC method, it is desired to obtain results that are closer to the mean and have a lower standard deviation.Design/methodology/approachThe MEREC method is based on the removal effects of the criteria on the overall performance. The method uses a logarithmic measure with a nonlinear function. MEREC-G using geometric mean and MEREC-H using harmonic mean are introduced in this study. The authors compared the MEREC method, its modifications and some other objective weight determination methods.FindingsMEREC-G and MEREC-H variants, which are modifications of the MEREC method, are shown to be effective in determining the objective weights of the criteria. Findings of the MEREC-G and MEREC-H variants are more convenient, simpler, more reasonable, closer to the mean and have fewer deviations. It was determined that the MEREC-G variant gave more compatible findings with the entropy method.Practical implicationsDecision-making can occur at any time in any area of life. There are various criteria and alternatives for decision-making. In multi-criteria decision-making (MCDM) models, it is a very important distinction to determine the criteria weights for the selection/ranking of the alternatives. The MEREC method can be used to find more reasonable or average results than other weight determination methods such as entropy. It can be expected that the MEREC method will be more used in daily life problems and various areas.Originality/valueObjective weight determination methods evaluate the weights of the criteria according to the scores of the determined alternatives. In this study, the MEREC method, which is an objective weight determination method, has been expanded. Although a nonlinear measurement model is used in the literature, the contribution was made in this study by using multiplicative functions. As an important originality, the authors demonstrated the effect of removing criteria in the MEREC method in a sensitivity analysis by actually removing the alternatives one by one from the model.","PeriodicalId":268888,"journal":{"name":"International Journal of Industrial Engineering and Operations Management","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131706477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-02-14DOI: 10.1108/ijieom-10-2021-0015
Lemma F. Lessa, Daniel Gebrehawariat
PurposeThis study is aimed at assessing the information security management practice with a focus on banking card security in selected financial institutions in Ethiopia, using an international information security standard as a benchmark. It is to identify the gaps and recommend best security practices to help financial institutions meet the required security compliance.Design/methodology/approachTwo financial sectors were purposively selected. A total of twenty-five respondents (IT executives and IT staff) were included in the study. Quantitative data was collected using the PCI-DSS (Payment Card Industry Data Security Standard) security standard questionnaire. In addition, observation and document analysis were made.FindingsThe result shows that most of the essential security management activities in the financial sectors do not comply with the international security standard. Similarly, the level of most of the indispensable security requirements that should be in place is found to be below the acceptable level. The study also revealed major security factors that prohibit the financial sectors from PCI-DSS security standard compliance.Originality/valueThis study assessed the information security management practice with a focus on banking card security and tried to figure out the limitations of security practices of the organizations surveyed based on the standard adopted. The topic has not been well explored especially in the Ethiopia context. Hence, the result can positively influence security policies, particularly in the banking sector.
{"title":"Effectiveness of banking card security in the Ethiopian financial sector: PCI-DSS security standard as a lens","authors":"Lemma F. Lessa, Daniel Gebrehawariat","doi":"10.1108/ijieom-10-2021-0015","DOIUrl":"https://doi.org/10.1108/ijieom-10-2021-0015","url":null,"abstract":"PurposeThis study is aimed at assessing the information security management practice with a focus on banking card security in selected financial institutions in Ethiopia, using an international information security standard as a benchmark. It is to identify the gaps and recommend best security practices to help financial institutions meet the required security compliance.Design/methodology/approachTwo financial sectors were purposively selected. A total of twenty-five respondents (IT executives and IT staff) were included in the study. Quantitative data was collected using the PCI-DSS (Payment Card Industry Data Security Standard) security standard questionnaire. In addition, observation and document analysis were made.FindingsThe result shows that most of the essential security management activities in the financial sectors do not comply with the international security standard. Similarly, the level of most of the indispensable security requirements that should be in place is found to be below the acceptable level. The study also revealed major security factors that prohibit the financial sectors from PCI-DSS security standard compliance.Originality/valueThis study assessed the information security management practice with a focus on banking card security and tried to figure out the limitations of security practices of the organizations surveyed based on the standard adopted. The topic has not been well explored especially in the Ethiopia context. Hence, the result can positively influence security policies, particularly in the banking sector.","PeriodicalId":268888,"journal":{"name":"International Journal of Industrial Engineering and Operations Management","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116989346","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-02-10DOI: 10.1108/ijieom-11-2022-0065
A. Deif
PurposeThis study aims at investigating the impact of using Lego Serious Play (LSP) on the effectiveness of teaching supply chain (SC) 4.0 in higher education by going from a traditional 2D approach to a 3D one. LSP in this study is explored as a gamification pedagogical approach that taps into the connection between hands and brain to inspire and engage students to build 3D models using metaphors and storytelling.Design/methodology/approachAn empirical study was conducted among 50 students (over two terms) who were enrolled in a SC 4.0 course and used LSP in their final project that focused on digital SC design. Two questionnaires were designed (one after the standard LSP workshop and the other upon completion of the project) to solicit feedback with respect to how LSP helped students to better understand SC 4.0 topics and fulfill their project. The results were analyzed using Bloom’s taxonomy as well as other pedagogical framework to understand the positive impact of LSP at the cognitive, motivation and social levels.FindingsResults showed that using LSP can enhance the teaching of various SC principles and technologies beyond the abstract point of view (2D) through offering the students an opportunity to apply these principles and technologies in a futuristic project using a hands-on 3D approach. The LSP approach demonstrated its ability to help students navigate through both lower order thinking skills (LOTS) and higher order thinking skills (HOTS) in a meaningful and playful manner. Finally, improving the design skills for students was clear using LSP as it unleashes imagination and taps into internal knowledge together with collective inputs.Research limitations/implicationsThe reliance on one case study can be a limitation regarding the generalization of the proposed results. This limitation is attenuated by the representativeness of the case study analyzed. Furthermore, the presented work should encourage future analyses as well as expanding the implementation of LSP to other SC 4.0 teaching contexts and applications.Originality/valueThis paper contributes to the very few literatures regarding using gamification in SC education and specifically how LSP methodology can be adopted in teaching SCM 4.0.
{"title":"Going from 2D to 3D in supply chain 4.0 education: an LSP approach","authors":"A. Deif","doi":"10.1108/ijieom-11-2022-0065","DOIUrl":"https://doi.org/10.1108/ijieom-11-2022-0065","url":null,"abstract":"PurposeThis study aims at investigating the impact of using Lego Serious Play (LSP) on the effectiveness of teaching supply chain (SC) 4.0 in higher education by going from a traditional 2D approach to a 3D one. LSP in this study is explored as a gamification pedagogical approach that taps into the connection between hands and brain to inspire and engage students to build 3D models using metaphors and storytelling.Design/methodology/approachAn empirical study was conducted among 50 students (over two terms) who were enrolled in a SC 4.0 course and used LSP in their final project that focused on digital SC design. Two questionnaires were designed (one after the standard LSP workshop and the other upon completion of the project) to solicit feedback with respect to how LSP helped students to better understand SC 4.0 topics and fulfill their project. The results were analyzed using Bloom’s taxonomy as well as other pedagogical framework to understand the positive impact of LSP at the cognitive, motivation and social levels.FindingsResults showed that using LSP can enhance the teaching of various SC principles and technologies beyond the abstract point of view (2D) through offering the students an opportunity to apply these principles and technologies in a futuristic project using a hands-on 3D approach. The LSP approach demonstrated its ability to help students navigate through both lower order thinking skills (LOTS) and higher order thinking skills (HOTS) in a meaningful and playful manner. Finally, improving the design skills for students was clear using LSP as it unleashes imagination and taps into internal knowledge together with collective inputs.Research limitations/implicationsThe reliance on one case study can be a limitation regarding the generalization of the proposed results. This limitation is attenuated by the representativeness of the case study analyzed. Furthermore, the presented work should encourage future analyses as well as expanding the implementation of LSP to other SC 4.0 teaching contexts and applications.Originality/valueThis paper contributes to the very few literatures regarding using gamification in SC education and specifically how LSP methodology can be adopted in teaching SCM 4.0.","PeriodicalId":268888,"journal":{"name":"International Journal of Industrial Engineering and Operations Management","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130059804","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}