Search results
1 – 10 of over 3000Denial-of-service (DoS) attacks develop unauthorized entry to various network services and user information by building traffic that creates multiple requests simultaneously…
Abstract
Purpose
Denial-of-service (DoS) attacks develop unauthorized entry to various network services and user information by building traffic that creates multiple requests simultaneously making the system unavailable to users. Protection of internet services requires effective DoS attack detection to keep an eye on traffic passing across protected networks, freeing the protected internet servers from surveillance threats and ensuring they can focus on offering high-quality services with the fewest response times possible.
Design/methodology/approach
This paper aims to develop a hybrid optimization-based deep learning model to precisely detect DoS attacks.
Findings
The designed Aquila deer hunting optimization-enabled deep belief network technique achieved improved performance with an accuracy of 92.8%, a true positive rate of 92.8% and a true negative rate of 93.6.
Originality/value
The introduced detection approach effectively detects DoS attacks available on the internet.
Details
Keywords
Vuyokazi Precious Camngca, Christopher Amoah and Emma Ayesu-Koranteng
The construction industry’s daily processes demand heavy data usage and communication between project participants to meet client requirements. Thus, the application of…
Abstract
Purpose
The construction industry’s daily processes demand heavy data usage and communication between project participants to meet client requirements. Thus, the application of information technology in project implementation has been increasing in the construction sector (CS) lately. However, the same cannot be seen in public sectors responsible for implementing government projects in South Africa. This study aimed to investigate the causes and effects of the underutilisation of information communication technology (ICT) in the building section of a public sector in a municipality in South Africa.
Design/methodology/approach
A qualitative approach was adopted for the study, using a public sector in one of the municipalities as a case study. Face-to-face interviews were conducted among the building unit workers, using unstructured interview questions. The data collected were analysed using the ATLAS.ti software.
Findings
The findings indicate a lack of understanding of existing and newly available ICT software and hardware technology among staff within the building technology due to lack of digitalisation in construction projects implementation, inadequate system upgrades, lack of adequate ICT resources, lack of financial resources for internet and software application subscriptions and lack of ICT training leading. The issues mentioned above have led to the outsourcing of projects professionals, slow pace of electronic emails, untrained professionals, usage of different and unlicensed software, resulting in the underutilisation of ICT within the whole building section. This change also adversely affects all officials, especially the junior officials who have graduated using the most recent ICT technology during their studies.
Research limitations/implications
The building department of only one public sector was used for the study; therefore, the findings may not be generalisable. The case study public sector’s name is withheld for confidentiality purposes.
Practical implications
Adequate change management and continuous development, combined with the allocation of proper resources, would be necessary for all staff members. Enormous investments had to be made in the ICT equipment by providing a sufficient budget in the building section of the public sectors. The building section within public sectors should provide change management to all aged skills staff by attending seminars to learn new ICT technology applied within its work environment.
Originality/value
The study established the causes of the underutilisation of ICT in the CS, especially in the public work departments and municipalities, and how this contributes to service delivery.
Details
Keywords
Lerato Aghimien, Clinton Ohis Aigbavboa and Douglas Aghimien
The current era of the fourth industrial revolution has attracted significant research on the use of digital technologies in improving construction project delivery. However, less…
Abstract
The current era of the fourth industrial revolution has attracted significant research on the use of digital technologies in improving construction project delivery. However, less emphasis has been placed on how these digital tools will influence the management of the construction workforce. To this end, using a review of existing works, this chapter explores the fourth industrial revolution and its associated technologies that can positively impact the management of the construction workforce when implemented. Also, the possible challenges that might truncate the successful deployment of digital technologies for effective workforce management were explored. The chapter submitted that implementing workforce management-specific digital platforms and other digital technologies designed for project delivery can aid effective workforce management within construction organisations. Technologies such as cloud computing, the Internet of Things, big data analytics, robotics and automation, and artificial intelligence, among others, offer significant benefits to the effective workforce management of construction organisations. However, several challenges, such as resistance to change due to fear of job loss, cost of investment in digital tools, organisational structure and culture, must be carefully considered as they might affect the successful use of digital tools and by extension, impact the success of workforce management in the organisations.
Details
Keywords
The rise of the metaverse has brought profound changes to the economic and social operation models and injected new vitality into academic research. Although a large number of…
Abstract
Purpose
The rise of the metaverse has brought profound changes to the economic and social operation models and injected new vitality into academic research. Although a large number of studies have emerged, there are few quantitative analyses of development frontiers and trends.
Design/methodology/approach
From a bibliometric perspective, this paper selects 183 pieces of metaverse-related literature in the WoS core database since 2000 as the object of analysis. This paper sums up the characteristics of the literature using the methods of descriptive statistical analysis, keywords analysis, thematic evolution analysis and summarizes the core themes and the laws of metaverse development in each stage.
Findings
The digital economy vision brought by the metaverse has led to an increasing number of researchers and achievements in this field. But the depth and breadth of research are still insufficient and unevenly distributed in the region, and the cross-fertilization fields need to be expanded. From the industry's point of view, VR games represented by Second Life and My World have contributed to the popularity of the metaverse. As technology progresses, the research hotspots in the field of metaverse gradually develop from conceptual research to artificial intelligence, blockchain, NFT and other technical applications. However, academic research has not yet caught up with the industry's pace and stays more in the concept discussion and preliminary application stage.
Originality/value
A systematic overview of the current status, knowledge structure and hot issues of metaverse research is shown, which provides a thematic axis for this field, enriches and improves the quantitative analysis of its literature and provides a clear picture for researchers to continuously promote the development of this field. At the same time, it is necessary to warn that technological development is a double-edged sword. The process of metaverse development should return to rationality, respect the laws of its development and guarantee the healthy development of the metaverse by strengthening legal regulation and the ethical review of science and technology.
Details
Keywords
Radha Subramanyam, Y. Adline Jancy and P. Nagabushanam
Cross-layer approach in media access control (MAC) layer will address interference and jamming problems. Hybrid distributed MAC can be used for simultaneous voice, data…
Abstract
Purpose
Cross-layer approach in media access control (MAC) layer will address interference and jamming problems. Hybrid distributed MAC can be used for simultaneous voice, data transmissions in wireless sensor network (WSN) and Internet of Things (IoT) applications. Choosing the correct objective function in Nash equilibrium for game theory will address fairness index and resource allocation to the nodes. Game theory optimization for distributed may increase the network performance. The purpose of this study is to survey the various operations that can be carried out using distributive and adaptive MAC protocol. Hill climbing distributed MAC does not need a central coordination system and location-based transmission with neighbor awareness reduces transmission power.
Design/methodology/approach
Distributed MAC in wireless networks is used to address the challenges like network lifetime, reduced energy consumption and for improving delay performance. In this paper, a survey is made on various cooperative communications in MAC protocols, optimization techniques used to improve MAC performance in various applications and mathematical approaches involved in game theory optimization for MAC protocol.
Findings
Spatial reuse of channel improved by 3%–29%, and multichannel improves throughput by 8% using distributed MAC protocol. Nash equilibrium is found to perform well, which focuses on energy utility in the network by individual players. Fuzzy logic improves channel selection by 17% and secondary users’ involvement by 8%. Cross-layer approach in MAC layer will address interference and jamming problems. Hybrid distributed MAC can be used for simultaneous voice, data transmissions in WSN and IoT applications. Cross-layer and cooperative communication give energy savings of 27% and reduces hop distance by 4.7%. Choosing the correct objective function in Nash equilibrium for game theory will address fairness index and resource allocation to the nodes.
Research limitations/implications
Other optimization techniques can be applied for WSN to analyze the performance.
Practical implications
Game theory optimization for distributed may increase the network performance. Optimal cuckoo search improves throughput by 90% and reduces delay by 91%. Stochastic approaches detect 80% attacks even in 90% malicious nodes.
Social implications
Channel allocations in centralized or static manner must be based on traffic demands whether dynamic traffic or fluctuated traffic. Usage of multimedia devices also increased which in turn increased the demand for high throughput. Cochannel interference keep on changing or mitigations occur which can be handled by proper resource allocations. Network survival is by efficient usage of valid patis in the network by avoiding transmission failures and time slots’ effective usage.
Originality/value
Literature survey is carried out to find the methods which give better performance.
Details
Keywords
Kashmira Ganji and Nikhat Afshan
In response to the growing interest in Internet of Things (IoT) technology and its profound implications for businesses and individuals, this bibliometric study focuses on a…
Abstract
Purpose
In response to the growing interest in Internet of Things (IoT) technology and its profound implications for businesses and individuals, this bibliometric study focuses on a critical yet understudied aspect, i.e. cybersecurity. As IoT adoption grows, so do concerns regarding user privacy and data security. This study aims to provide a comprehensive understanding of the current research in this vital area, shedding light on research trends, gaps and emerging themes.
Design/methodology/approach
The study conducted a bibliometric analysis and systematic review of literature spanning over two decades (2013–2023). Bibliometric analysis is conducted using Biblioshiny which is R-software-based advanced analytical tool. Further, VOSviewer is used to conduct network analysis. The study highlights the evolving landscape of IoT cybersecurity, emphasizing interdisciplinary intersections and the ethical dimensions of IoT technologies.
Findings
The study uncovers crucial concerns related to IoT adoption, emphasizing the urgent need for comprehensive cybersecurity protocols. It identifies emerging themes such as artificial intelligence and blockchain integration, indicating a shift toward interdisciplinary solutions. Furthermore, the research highlights ethical gaps in current IoT discussions, emphasizing the importance of responsible innovation.
Research limitations/implications
Businesses can bolster their cybersecurity strategies, policymakers can craft informed regulations and researchers are encouraged to explore IoT’s ethical dimensions.
Originality/value
This study pioneers a nuanced analysis of IoT cybersecurity, filling a crucial gap in the existing business and management literature. By synthesizing a decade of scholarly work, it provides foundational insights for researchers, businesses and policymakers. The research not only informs academic discourse but also offers practical guidance for enhancing IoT security measures and fostering ethical innovation.
Details
Keywords
Riddhi Thavi, Rujuta Jhaveri, Vaibhav Narwane, Bhaskar Gardas and Nima Jafari Navimipour
This paper aims to provide a literature review on the cloud-based platforms for the education sectors. The several aspects of cloud computing adoption in education…
Abstract
Purpose
This paper aims to provide a literature review on the cloud-based platforms for the education sectors. The several aspects of cloud computing adoption in education, remote/distance learning and the application of cloud-based design and manufacturing (CBDM) have been studied and theorised.
Design/methodology/approach
A four-step methodology was adopted to analyse and categorise the papers obtained through various search engines. Out of 429 research articles, 72 papers were shortlisted for the detailed analysis.
Findings
Many factors that influence cloud computing technology adoption in the education sector have been identified in this paper. The research findings on several research items have been tabulated and discussed. Based on the theoretical research done on cloud computing for education, cloud computing for remote/distance learning and CBDM, cloud computing could enhance the educational systems in mainly developing countries and improve the scope for remote/distance learning.
Research limitations/implications
This study is limited to papers published only in the past decade from 2011 to 2020. Besides, this review was unable to include journal articles published in different languages. Nevertheless, for the effective teaching and learning process, this paper could help understand the importance and improve the process of adopting cloud computing concepts in educational universities and platforms.
Originality/value
This study is a novel one as a research review constituting cloud computing applications in education and extended for remote/distance learning and CBDM, which have not been studied in the existing knowledge base.
Details
Keywords
Femi Emmanuel Adeosun and Ayodeji Emmanuel Oke
In recent times, the construction industry is being influenced by technological innovations when delivering a better, more effective and efficient desired project, cyber-physical…
Abstract
Purpose
In recent times, the construction industry is being influenced by technological innovations when delivering a better, more effective and efficient desired project, cyber-physical systems (CPSs) offer a coupling of the physical and engineered systems by monitoring, coordinating, controlling and integrating their operations. This study aims to examine the level of awareness of professionals and usage of CPSs for construction projects in Nigerian construction industry.
Design/methodology/approach
The target population for this study was the professionals in the construction industry consisting Architects, Quantity Surveyors, Engineers and Builders. Data collection was through the use of a structured questionnaire administered to the target population. The data was analyzed by using statistical tools.
Findings
This study concluded that the construction professionals in the Nigerian construction industry are mostly aware about the heating, ventilation and air conditioning (HVAC) systems, global positioning system, microphone, speakers and camera as the most widely used CPSs in construction industry. HVAC systems was also found to be the mostly adopted technologies in the construction industry.
Originality/value
This study recommended that platforms that increase the awareness and encourage the usage of CPSs in construction industry should be encouraged by stakeholders concerned with management of construction projects. Such include electronic construction and adoption of blockchain technology.
Details
Keywords
Qiqi Liu and Tingwu Yan
This paper investigates the ways digital media applications in rural areas have transformed the influence of social networks (SN) on farmers' adoption of various climate change…
Abstract
Purpose
This paper investigates the ways digital media applications in rural areas have transformed the influence of social networks (SN) on farmers' adoption of various climate change mitigation measures (CCMM), and explores the key mechanisms behind this transformation.
Design/methodology/approach
The study analyzes data from 1,002 farmers’ surveys. First, a logit model is used to measure the impact of SN on the adoption of different types of CCMM. Then, the interaction term between digital media usage (DMU) and SN is introduced to analyze the moderating effect of digital media on the impact of SN. Finally, a conditional process model is used to explore the mediating mechanism of agricultural socialization services (ASS) and the validity of information acquisition (VIA).
Findings
The results reveal that: (1) SN significantly promotes the adoption of CCMM and the marginal effect of this impact varies with different kinds of technologies. (2) DMU reinforces the effectiveness of SN in promoting farmers' adoption of CCMM. (3) The key mechanisms of the process in (2) are the ASS and the VIA.
Originality/value
This study shows that in the context of DMU, SN’s promotion effect on farmers' adoption of CCMM is strengthened.
Details
Keywords
The paper validates a framework using the media synchronicity theory (MST) to study the effect of Social Media Use at Work (SMUW) on the performance “Work Performance” (WP) of the…
Abstract
Purpose
The paper validates a framework using the media synchronicity theory (MST) to study the effect of Social Media Use at Work (SMUW) on the performance “Work Performance” (WP) of the employee. For this, the study initially observed the effect of SMUW on shared vision (SV), network ties (NT), and trust (TRUST) on the knowledge transfer (KT) and the effect of all (SV, NT, TRUST and KT) on the WP of the employees.
Design/methodology/approach
A survey method was used to collect responses from 157 employees working at middle and lower-level managerial positions in the chemical companies of India. The data analysis uses variance-based, partial least square SEM, which has established a relationship between the constructs.
Findings
The results found a significant effect of SMUW on the WP of the employees. It was observed that the SV and TRUST can be significantly improved with the help of SMUW, contributing to the KT and simultaneously affecting the WP of the employees.
Practical implications
The study has examined the positive and significant effect of SMUW on the employees' SV, NT and TRUST. Improving SV, NT and trust (dimension of social capital) through social media allows employees to transfer more knowledge. An increase in KT among the employees further positively affected the individual and group performance within the organization. SV positively affected the employee's WP, but NT and trust negatively affected the WP. The research thus provides useful insight to the managers for effective use of social media in the workplace.
Originality/value
The study used MST to understand the effect of the use of social media in the workplace. The study is kind of first in the Indian context which has examined the effect of employees at managerial level in chemical companies, and thus contributes to the existing literature on social networks/social media from the organizational context.
Details