Search results

1 – 10 of 66
Open Access
Article
Publication date: 31 July 2023

Christiaan Ernst (Riaan) Heyman

This study aims to, firstly, develop a red flag checklist for cryptocurrency Ponzi schemes and, secondly, to test this red flag checklist against publicly available marketing…

2212

Abstract

Purpose

This study aims to, firstly, develop a red flag checklist for cryptocurrency Ponzi schemes and, secondly, to test this red flag checklist against publicly available marketing material for Mirror Trading International (MTI). The red flag checklist test seeks to establish if MTI’s marketing material posted on YouTube® (in the form of a live video presentation) exhibits any of the red flags from the checklist.

Design/methodology/approach

The study uses a structured literature review and qualitative analysis of red flags for Ponzi and cryptocurrency Ponzi schemes.

Findings

A research lacuna was discovered with regard to cryptocurrency Ponzi scheme red flags. By means of a structured literature review, journal papers were identified that listed and discussed Ponzi scheme red flags. The red flags from the identified journal papers were subsequently used in a qualitative analysis. The analyses and syntheses resulted in the development of a red flag checklist for cryptocurrency Ponzi schemes, with five red flag categories, containing 18 associated red flags. The red flag checklist was then tested against MTI’s marketing material (a transcription of a live YouTube presentation). The test resulted in MTI’s marketing material exhibiting 88% of the red flags contained within the checklist.

Research limitations/implications

The inherent limitations in the design of using a structured literature review and the lack of research regarding the cryptocurrency Ponzi scheme red flags.

Practical implications

The study provides a red flag checklist for cryptocurrency Ponzi schemes. The red flag checklist can be applied to a cryptocurrency investment scheme’s marketing material to establish if it exhibits any of these red flags.

Social implications

The red flag checklist can be applied to a cryptocurrency investment scheme’s marketing material to establish if it exhibits any of these red flags.

Originality/value

The study provides a red flag checklist for cryptocurrency Ponzi schemes.

Details

Journal of Financial Crime, vol. 31 no. 3
Type: Research Article
ISSN: 1359-0790

Keywords

Open Access
Article
Publication date: 30 April 2024

Armando Di Meglio, Nicola Massarotti and Perumal Nithiarasu

In this study, the authors propose a novel digital twinning approach specifically designed for controlling transient thermal systems. The purpose of this study is to harness the…

Abstract

Purpose

In this study, the authors propose a novel digital twinning approach specifically designed for controlling transient thermal systems. The purpose of this study is to harness the combined power of deep learning (DL) and physics-based methods (PBM) to create an active virtual replica of the physical system.

Design/methodology/approach

To achieve this goal, we introduce a deep neural network (DNN) as the digital twin and a Finite Element (FE) model as the physical system. This integrated approach is used to address the challenges of controlling an unsteady heat transfer problem with an integrated feedback loop.

Findings

The results of our study demonstrate the effectiveness of the proposed digital twinning approach in regulating the maximum temperature within the system under varying and unsteady heat flux conditions. The DNN, trained on stationary data, plays a crucial role in determining the heat transfer coefficients necessary to maintain temperatures below a defined threshold value, such as the material’s melting point. The system is successfully controlled in 1D, 2D and 3D case studies. However, careful evaluations should be conducted if such a training approach, based on steady-state data, is applied to completely different transient heat transfer problems.

Originality/value

The present work represents one of the first examples of a comprehensive digital twinning approach to transient thermal systems, driven by data. One of the noteworthy features of this approach is its robustness. Adopting a training based on dimensionless data, the approach can seamlessly accommodate changes in thermal capacity and thermal conductivity without the need for retraining.

Details

International Journal of Numerical Methods for Heat & Fluid Flow, vol. 34 no. 6
Type: Research Article
ISSN: 0961-5539

Keywords

Open Access
Article
Publication date: 3 October 2022

Williams Ezinwa Nwagwu and Antonia Bernadette Donkor

The study examined the personal information management (PIM) challenges encountered by faculty in six universities in Ghana, their information refinding experiences and the…

1204

Abstract

Purpose

The study examined the personal information management (PIM) challenges encountered by faculty in six universities in Ghana, their information refinding experiences and the perceived role of memory. The study tested the hypothesis that faculty PIM performance will significantly differ when the differences in the influence of personal factors (age, gender and rank) on their memory are considered.

Design/methodology/approach

The study was guided by a sample survey design. A questionnaire designed based on themes extracted from earlier interviews was used to collect quantitative data from 235 faculty members from six universities in Ghana. Data analysis was undertaken with a discrete multivariate Generalized Linear Model to investigate how memory intermediates in the relationship between age, gender and rank, and, refinding of stored information.

Findings

The paper identified two subfunctions of refinding (Refinding 1 and Refinding 2) associated with self-confidence in information re-finding, and, memory (Memory 1 and Memory 2), associated with the use of complimentary frames to locate previously found and stored information. There were no significant multivariate effects for gender as a stand-alone variable. Males who were aged less than 39 could refind stored information irrespective of the memory class. Older faculty aged 40–49 who possess Memory 1 and senior lecturers who possess Memory 2 performed well in refinding information. There was a statistically significant effect of age and memory; and rank and memory.

Research limitations/implications

This study was limited to faculty in Ghana, whereas the study itself has implications for demographic differences in PIM.

Practical implications

Identifying how memory mediates the role of personal factors in faculty refinding of stored information will be necessary for the efforts to understand and design systems and technologies for enhancing faculty capacity to find/refind stored information.

Social implications

Understanding how human memory can be augmented by technology is a great PIM strategy, but understanding how human memory and personal factors interplay to affect PIM is more important.

Originality/value

PIM of faculty has been extensively examined in the literature, and limitations of memory has always been identified as a constraint. Human memory has been augmented with technology, although the outcome has been very minimal. This study shows that in addition to technology augmentation, personal factors interplay with human memory to affect PIM. Discrete multivariate Generalized Linear Model applied in this study is an innovative way of addressing the challenges of assimilating statistical methodologies in psychosocial disciplines.

Details

Library Hi Tech, vol. 42 no. 3
Type: Research Article
ISSN: 0737-8831

Keywords

Open Access
Article
Publication date: 25 December 2023

Vicki Catherine Waye, Collette Snowden, Jane Knowler, Paula Zito, Jack Burton and Joe McIntyre

The purpose of this paper is to examine whether mandatory disclosure of information accompanying the sale of real estate achieves its aim of informed purchasers.

Abstract

Purpose

The purpose of this paper is to examine whether mandatory disclosure of information accompanying the sale of real estate achieves its aim of informed purchasers.

Design/methodology/approach

Using a case study approach focused on mandatory disclosure in South Australia data was collected from interviews and focus groups with key personnel in the property industry involved in the production of information required to fulfil vendors’ disclosure obligations.

Findings

The authors found that purchasers are ill-served by a long and complex form of mandatory disclosure with a short time frame that prevents the use of the information provided. Without good form design and increased digital affordances provided by the cadastral and conveyancing systems, mandatory disclosure is insufficient to ensure minimisation of information asymmetry between vendor and purchaser.

Originality/value

To the best of the authors’ knowledge, this is the first Australian qualitative study that examines the utility of mandatory vendor disclosure in real estate sales and the first to consider the impact of the digitalisation of cadastral and conveyancing systems upon the efficacy of mandatory disclosure regimes.

Details

Journal of Property, Planning and Environmental Law, vol. 16 no. 3
Type: Research Article
ISSN: 2514-9407

Keywords

Open Access
Article
Publication date: 26 April 2024

Luís Jacques de Sousa, João Poças Martins and Luís Sanhudo

Factors like bid price, submission time, and number of bidders influence the procurement process in public projects. These factors and the award criteria may impact the project’s…

Abstract

Purpose

Factors like bid price, submission time, and number of bidders influence the procurement process in public projects. These factors and the award criteria may impact the project’s financial compliance. Predicting budget compliance in construction projects has been traditionally challenging, but Machine Learning (ML) techniques have revolutionised estimations.

Design/methodology/approach

In this study, Portuguese Public Procurement Data (PPPData) was utilised as the model’s input. Notably, this dataset exhibited a substantial imbalance in the target feature. To address this issue, the study evaluated three distinct data balancing techniques: oversampling, undersampling, and the SMOTE method. Next, a comprehensive feature selection process was conducted, leading to the testing of five different algorithms for forecasting budget compliance. Finally, a secondary test was conducted, refining the features to include only those elements that procurement technicians can modify while also considering the two most accurate predictors identified in the previous test.

Findings

The findings indicate that employing the SMOTE method on the scraped data can achieve a balanced dataset. Furthermore, the results demonstrate that the Adam ANN algorithm outperformed others, boasting a precision rate of 68.1%.

Practical implications

The model can aid procurement technicians during the tendering phase by using historical data and analogous projects to predict performance.

Social implications

Although the study reveals that ML algorithms cannot accurately predict budget compliance using procurement data, they can still provide project owners with insights into the most suitable criteria, aiding decision-making. Further research should assess the model’s impact and capacity within the procurement workflow.

Originality/value

Previous research predominantly focused on forecasting budgets by leveraging data from the private construction execution phase. While some investigations incorporated procurement data, this study distinguishes itself by using an imbalanced dataset and anticipating compliance rather than predicting budgetary figures. The model predicts budget compliance by analysing qualitative and quantitative characteristics of public project contracts. The research paper explores various model architectures and data treatment techniques to develop a model to assist the Client in tender definition.

Details

Engineering, Construction and Architectural Management, vol. 31 no. 13
Type: Research Article
ISSN: 0969-9988

Keywords

Open Access
Article
Publication date: 12 July 2024

Osama Habbal, Ahmad Farhat, Reem Khalil and Christopher Pannier

The purpose of this study is to assess a novel method for creating tangible three-dimensional (3D) morphologies (scaled models) of neuronal reconstructions and to evaluate its…

Abstract

Purpose

The purpose of this study is to assess a novel method for creating tangible three-dimensional (3D) morphologies (scaled models) of neuronal reconstructions and to evaluate its cost-effectiveness, accessibility and applicability through a classroom survey. The study addresses the challenge of accurately representing intricate and diverse dendritic structures of neurons in scaled models for educational purposes.

Design/methodology/approach

The method involves converting neuronal reconstructions from the NeuromorphoVis repository into 3D-printable mold files. An operator prints these molds using a consumer-grade desktop 3D printer with water-soluble polyvinyl alcohol filament. The molds are then filled with casting materials like polyurethane or silicone rubber, before the mold is dissolved. We tested our method on various neuron morphologies, assessing the method’s effectiveness, labor, processing times and costs. Additionally, university biology students compared our 3D-printed neuron models with commercially produced counterparts through a survey, evaluating them based on their direct experience with both models.

Findings

An operator can produce a neuron morphology’s initial 3D replica in about an hour of labor, excluding a one- to three-day curing period, while subsequent copies require around 30 min each. Our method provides an affordable approach to crafting tangible 3D neuron representations, presenting a viable alternative to direct 3D printing with varied material options ensuring both flexibility and durability. The created models accurately replicate the fidelity and intricacy of original computer aided design (CAD) files, making them ideal for tactile use in neuroscience education.

Originality/value

The development of data processing and cost-effective casting method for this application is novel. Compared to a previous study, this method leverages lower-cost fused filament fabrication 3D printing to create accurate physical 3D representations of neurons. By using readily available materials and a consumer-grade 3D printer, the research addresses the high cost associated with alternative direct 3D printing techniques to produce such intricate and robust models. Furthermore, the paper demonstrates the practicality of these 3D neuron models for educational purposes, making a valuable contribution to the field of neuroscience education.

Open Access
Article
Publication date: 11 August 2023

Jacobus Gerhardus J. Nortje and Daniel Christoffel Myburgh

This paper aims to identify impediments, discuss impediments and make recommendations for the impediments during the execution of a search and seizure warrant for digital evidence…

1034

Abstract

Purpose

This paper aims to identify impediments, discuss impediments and make recommendations for the impediments during the execution of a search and seizure warrant for digital evidence in South African criminal cases.

Design/methodology/approach

The discussion of this article, the second article of two, focuses on a literature review of international and local impediments identified in case law and published research literature and how it is approached in various jurisdictions.

Findings

This study found that impediments identified and addressed internationally during the execution of a search and seizure warrant for digital evidence are relevant to South African criminal cases and still need to be addressed during the execution of a search and seizure warrant for digital evidence in South African criminal cases.

Research limitations/implications

Although searches and seizures for digital evidence are relevant to civil, regulatory and criminal investigations, this study focuses on the search and seizure for digital evidence in criminal matters with an emphasis on the provisions of the Criminal Procedure Act 51 of 1977 and the Cybercrimes Act 19 of 2020.

Originality/value

The originality of this paper lies in the procedures followed during the physical search and seizure of digital information during the execution of search and seizure warrants for digital information in South Africa. If the South African Police Service follows the recommended procedures, it will contribute to the success of the South African Police Service, which would result in the improved quality of investigations and successful prosecution of crime in South Africa.

Open Access
Article
Publication date: 27 September 2023

Lilian M. Hoogenboom, Maria T.M. Dijkstra and Bianca Beersma

Scholars and practitioners alike wish to understand what makes workplace conflict beneficial or injurious to, for example, performance and satisfaction. The authors focus on…

2110

Abstract

Purpose

Scholars and practitioners alike wish to understand what makes workplace conflict beneficial or injurious to, for example, performance and satisfaction. The authors focus on parties’ personal experience of the conflict, which is complementary to studying conflict issues (i.e. task- or relationship-related conflict). Although many authors discuss the personal experience of conflict, which the authors will refer to as conflict personalization, different definitions are used, leading to conceptual vagueness. Therefore, the purpose of this paper is to develop an integrative definition of the concept of conflict personalization.

Design/methodology/approach

The authors conducted a systematic literature review to collect definitions and conceptualizations from 41 publications. The subsequent thematic analysis revealed four building blocks that were used to develop an integrative definition of conflict personalization.

Findings

The authors developed the following definition: Conflict personalization is the negative affective as well as cognitive reaction to the self being threatened and/or in danger as a result of a social interaction about perceived incompatibilities.

Practical implications

The integrative definition of this study enables the development of a measurement instrument to assess personalization during workplace conflict, paving the way for developing effective research-based interventions.

Originality/value

Conceptual vagueness hampers theoretical development, empirical research and the development of effective interventions. Although the importance of conflict personalization is mentioned within the field of workplace conflict, it has not been empirically studied yet. This paper can serve as the basis for future research in which conflict issue and personal experience are separated.

Details

International Journal of Conflict Management, vol. 35 no. 2
Type: Research Article
ISSN: 1044-4068

Keywords

Open Access
Article
Publication date: 31 October 2022

Cyril Chinonso Ejidike, Modupe Cecilia Mewomo and Iruka Chijindu Anugwo

The current movement toward digitisation has promoted the adoption of smart building technology globally. Despite its advantages, its usage in developing countries such as Nigeria…

2395

Abstract

Purpose

The current movement toward digitisation has promoted the adoption of smart building technology globally. Despite its advantages, its usage in developing countries such as Nigeria is still very low. Therefore, the purpose of this paper is to investigate construction professionals' awareness of smart building concepts (SBCs) in the Nigerian construction industry and identify the parameters by which SBCs can be measured.

Design/methodology/approach

A quantitative survey was carried out using a questionnaire to gather relevant data in the study area. This paper was conducted on 363 registered construction professionals in the Nigerian construction industry. The collected data were analysed using descriptive statistics and Kruskal–Wallis H test analysis.

Findings

This paper indicated that the majority of Nigerian construction professionals are aware of SBCs. Furthermore, the Kruskal–Wallis H test shows no significant difference between the awareness level of the various construction professionals. This paper further revealed energy management systems, IT network connectivity, safety and security management systems and building automation systems as the most significant parameters in which SBCs can be measured.

Practical implications

This paper identified significant parameters influencing SBCs awareness in the Nigerian construction industry. These parameters can be integrated into the building during the design stage and can be incorporated into the policymaking process of construction firms to promote the awareness of SBCs and encourage practices related to construction sustainability.

Originality/value

This paper provides empirical evidence on the awareness of SBCs among construction professionals and significant parameters influencing awareness in the Nigerian construction industry.

Details

Journal of Engineering, Design and Technology , vol. 22 no. 5
Type: Research Article
ISSN: 1726-0531

Keywords

Open Access
Article
Publication date: 31 May 2024

Florian Königstorfer

Companies are increasingly benefiting from artificial intelligence (AI) applications in various domains, but also facing its negative impacts. The challenge lies in the lack of…

Abstract

Purpose

Companies are increasingly benefiting from artificial intelligence (AI) applications in various domains, but also facing its negative impacts. The challenge lies in the lack of clear governance mechanisms for AI. While documentation is a key governance tool, standard software engineering practices are inadequate for AI. Practitioners are unsure about how to document AI, raising questions about the effectiveness of current documentation guidelines. This review examines whether AI documentation guidelines meet regulatory and industry needs for AI applications and suggests directions for future research.

Design/methodology/approach

A structured literature review was conducted. In total, 38 papers from top journals and conferences in the fields of medicine and information systems as well as journals focused on fair, accountable and transparent AI were reviewed.

Findings

This literature review contributes to the literature by investigating the extent to which current documentation guidelines can meet the documentation requirements for AI applications from regulatory bodies and industry practitioners and by presenting avenues for future research. This paper finds contemporary documentation guidelines inadequate in meeting regulators’ and professionals’' expectations. This paper concludes with three recommended avenues for future research.

Originality/value

This paper benefits from the insights from comprehensive and up-to-date sources on the documentation of AI applications.

Details

Digital Policy, Regulation and Governance, vol. 26 no. 5
Type: Research Article
ISSN: 2398-5038

Keywords

Access

Only Open Access

Year

Last 6 months (66)

Content type

Article (66)
1 – 10 of 66