Search results

1 – 10 of over 3000
Article
Publication date: 26 January 2024

Merly Thomas and Meshram B.B.

Denial-of-service (DoS) attacks develop unauthorized entry to various network services and user information by building traffic that creates multiple requests simultaneously…

Abstract

Purpose

Denial-of-service (DoS) attacks develop unauthorized entry to various network services and user information by building traffic that creates multiple requests simultaneously making the system unavailable to users. Protection of internet services requires effective DoS attack detection to keep an eye on traffic passing across protected networks, freeing the protected internet servers from surveillance threats and ensuring they can focus on offering high-quality services with the fewest response times possible.

Design/methodology/approach

This paper aims to develop a hybrid optimization-based deep learning model to precisely detect DoS attacks.

Findings

The designed Aquila deer hunting optimization-enabled deep belief network technique achieved improved performance with an accuracy of 92.8%, a true positive rate of 92.8% and a true negative rate of 93.6.

Originality/value

The introduced detection approach effectively detects DoS attacks available on the internet.

Details

International Journal of Web Information Systems, vol. 20 no. 1
Type: Research Article
ISSN: 1744-0084

Keywords

Open Access
Article
Publication date: 25 April 2022

Vuyokazi Precious Camngca, Christopher Amoah and Emma Ayesu-Koranteng

The construction industry’s daily processes demand heavy data usage and communication between project participants to meet client requirements. Thus, the application of…

2131

Abstract

Purpose

The construction industry’s daily processes demand heavy data usage and communication between project participants to meet client requirements. Thus, the application of information technology in project implementation has been increasing in the construction sector (CS) lately. However, the same cannot be seen in public sectors responsible for implementing government projects in South Africa. This study aimed to investigate the causes and effects of the underutilisation of information communication technology (ICT) in the building section of a public sector in a municipality in South Africa.

Design/methodology/approach

A qualitative approach was adopted for the study, using a public sector in one of the municipalities as a case study. Face-to-face interviews were conducted among the building unit workers, using unstructured interview questions. The data collected were analysed using the ATLAS.ti software.

Findings

The findings indicate a lack of understanding of existing and newly available ICT software and hardware technology among staff within the building technology due to lack of digitalisation in construction projects implementation, inadequate system upgrades, lack of adequate ICT resources, lack of financial resources for internet and software application subscriptions and lack of ICT training leading. The issues mentioned above have led to the outsourcing of projects professionals, slow pace of electronic emails, untrained professionals, usage of different and unlicensed software, resulting in the underutilisation of ICT within the whole building section. This change also adversely affects all officials, especially the junior officials who have graduated using the most recent ICT technology during their studies.

Research limitations/implications

The building department of only one public sector was used for the study; therefore, the findings may not be generalisable. The case study public sector’s name is withheld for confidentiality purposes.

Practical implications

Adequate change management and continuous development, combined with the allocation of proper resources, would be necessary for all staff members. Enormous investments had to be made in the ICT equipment by providing a sufficient budget in the building section of the public sectors. The building section within public sectors should provide change management to all aged skills staff by attending seminars to learn new ICT technology applied within its work environment.

Originality/value

The study established the causes of the underutilisation of ICT in the CS, especially in the public work departments and municipalities, and how this contributes to service delivery.

Details

Journal of Facilities Management , vol. 22 no. 1
Type: Research Article
ISSN: 1472-5967

Keywords

Book part
Publication date: 12 February 2024

Lerato Aghimien, Clinton Ohis Aigbavboa and Douglas Aghimien

The current era of the fourth industrial revolution has attracted significant research on the use of digital technologies in improving construction project delivery. However, less…

Abstract

The current era of the fourth industrial revolution has attracted significant research on the use of digital technologies in improving construction project delivery. However, less emphasis has been placed on how these digital tools will influence the management of the construction workforce. To this end, using a review of existing works, this chapter explores the fourth industrial revolution and its associated technologies that can positively impact the management of the construction workforce when implemented. Also, the possible challenges that might truncate the successful deployment of digital technologies for effective workforce management were explored. The chapter submitted that implementing workforce management-specific digital platforms and other digital technologies designed for project delivery can aid effective workforce management within construction organisations. Technologies such as cloud computing, the Internet of Things, big data analytics, robotics and automation, and artificial intelligence, among others, offer significant benefits to the effective workforce management of construction organisations. However, several challenges, such as resistance to change due to fear of job loss, cost of investment in digital tools, organisational structure and culture, must be carefully considered as they might affect the successful use of digital tools and by extension, impact the success of workforce management in the organisations.

Details

Construction Workforce Management in the Fourth Industrial Revolution Era
Type: Book
ISBN: 978-1-83797-019-3

Keywords

Article
Publication date: 16 December 2022

Xin Feng, Xu Wang and Ying Su

The rise of the metaverse has brought profound changes to the economic and social operation models and injected new vitality into academic research. Although a large number of…

1131

Abstract

Purpose

The rise of the metaverse has brought profound changes to the economic and social operation models and injected new vitality into academic research. Although a large number of studies have emerged, there are few quantitative analyses of development frontiers and trends.

Design/methodology/approach

From a bibliometric perspective, this paper selects 183 pieces of metaverse-related literature in the WoS core database since 2000 as the object of analysis. This paper sums up the characteristics of the literature using the methods of descriptive statistical analysis, keywords analysis, thematic evolution analysis and summarizes the core themes and the laws of metaverse development in each stage.

Findings

The digital economy vision brought by the metaverse has led to an increasing number of researchers and achievements in this field. But the depth and breadth of research are still insufficient and unevenly distributed in the region, and the cross-fertilization fields need to be expanded. From the industry's point of view, VR games represented by Second Life and My World have contributed to the popularity of the metaverse. As technology progresses, the research hotspots in the field of metaverse gradually develop from conceptual research to artificial intelligence, blockchain, NFT and other technical applications. However, academic research has not yet caught up with the industry's pace and stays more in the concept discussion and preliminary application stage.

Originality/value

A systematic overview of the current status, knowledge structure and hot issues of metaverse research is shown, which provides a thematic axis for this field, enriches and improves the quantitative analysis of its literature and provides a clear picture for researchers to continuously promote the development of this field. At the same time, it is necessary to warn that technological development is a double-edged sword. The process of metaverse development should return to rationality, respect the laws of its development and guarantee the healthy development of the metaverse by strengthening legal regulation and the ethical review of science and technology.

Details

Library Hi Tech, vol. 42 no. 1
Type: Research Article
ISSN: 0737-8831

Keywords

Article
Publication date: 11 October 2023

Radha Subramanyam, Y. Adline Jancy and P. Nagabushanam

Cross-layer approach in media access control (MAC) layer will address interference and jamming problems. Hybrid distributed MAC can be used for simultaneous voice, data…

Abstract

Purpose

Cross-layer approach in media access control (MAC) layer will address interference and jamming problems. Hybrid distributed MAC can be used for simultaneous voice, data transmissions in wireless sensor network (WSN) and Internet of Things (IoT) applications. Choosing the correct objective function in Nash equilibrium for game theory will address fairness index and resource allocation to the nodes. Game theory optimization for distributed may increase the network performance. The purpose of this study is to survey the various operations that can be carried out using distributive and adaptive MAC protocol. Hill climbing distributed MAC does not need a central coordination system and location-based transmission with neighbor awareness reduces transmission power.

Design/methodology/approach

Distributed MAC in wireless networks is used to address the challenges like network lifetime, reduced energy consumption and for improving delay performance. In this paper, a survey is made on various cooperative communications in MAC protocols, optimization techniques used to improve MAC performance in various applications and mathematical approaches involved in game theory optimization for MAC protocol.

Findings

Spatial reuse of channel improved by 3%–29%, and multichannel improves throughput by 8% using distributed MAC protocol. Nash equilibrium is found to perform well, which focuses on energy utility in the network by individual players. Fuzzy logic improves channel selection by 17% and secondary users’ involvement by 8%. Cross-layer approach in MAC layer will address interference and jamming problems. Hybrid distributed MAC can be used for simultaneous voice, data transmissions in WSN and IoT applications. Cross-layer and cooperative communication give energy savings of 27% and reduces hop distance by 4.7%. Choosing the correct objective function in Nash equilibrium for game theory will address fairness index and resource allocation to the nodes.

Research limitations/implications

Other optimization techniques can be applied for WSN to analyze the performance.

Practical implications

Game theory optimization for distributed may increase the network performance. Optimal cuckoo search improves throughput by 90% and reduces delay by 91%. Stochastic approaches detect 80% attacks even in 90% malicious nodes.

Social implications

Channel allocations in centralized or static manner must be based on traffic demands whether dynamic traffic or fluctuated traffic. Usage of multimedia devices also increased which in turn increased the demand for high throughput. Cochannel interference keep on changing or mitigations occur which can be handled by proper resource allocations. Network survival is by efficient usage of valid patis in the network by avoiding transmission failures and time slots’ effective usage.

Originality/value

Literature survey is carried out to find the methods which give better performance.

Details

International Journal of Pervasive Computing and Communications, vol. 20 no. 2
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 19 February 2024

Kashmira Ganji and Nikhat Afshan

In response to the growing interest in Internet of Things (IoT) technology and its profound implications for businesses and individuals, this bibliometric study focuses on a…

Abstract

Purpose

In response to the growing interest in Internet of Things (IoT) technology and its profound implications for businesses and individuals, this bibliometric study focuses on a critical yet understudied aspect, i.e. cybersecurity. As IoT adoption grows, so do concerns regarding user privacy and data security. This study aims to provide a comprehensive understanding of the current research in this vital area, shedding light on research trends, gaps and emerging themes.

Design/methodology/approach

The study conducted a bibliometric analysis and systematic review of literature spanning over two decades (2013–2023). Bibliometric analysis is conducted using Biblioshiny which is R-software-based advanced analytical tool. Further, VOSviewer is used to conduct network analysis. The study highlights the evolving landscape of IoT cybersecurity, emphasizing interdisciplinary intersections and the ethical dimensions of IoT technologies.

Findings

The study uncovers crucial concerns related to IoT adoption, emphasizing the urgent need for comprehensive cybersecurity protocols. It identifies emerging themes such as artificial intelligence and blockchain integration, indicating a shift toward interdisciplinary solutions. Furthermore, the research highlights ethical gaps in current IoT discussions, emphasizing the importance of responsible innovation.

Research limitations/implications

Businesses can bolster their cybersecurity strategies, policymakers can craft informed regulations and researchers are encouraged to explore IoT’s ethical dimensions.

Originality/value

This study pioneers a nuanced analysis of IoT cybersecurity, filling a crucial gap in the existing business and management literature. By synthesizing a decade of scholarly work, it provides foundational insights for researchers, businesses and policymakers. The research not only informs academic discourse but also offers practical guidance for enhancing IoT security measures and fostering ethical innovation.

Details

Journal of Science and Technology Policy Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2053-4620

Keywords

Article
Publication date: 27 December 2021

Riddhi Thavi, Rujuta Jhaveri, Vaibhav Narwane, Bhaskar Gardas and Nima Jafari Navimipour

This paper aims to provide a literature review on the cloud-based platforms for the education sectors. The several aspects of cloud computing adoption in education…

Abstract

Purpose

This paper aims to provide a literature review on the cloud-based platforms for the education sectors. The several aspects of cloud computing adoption in education, remote/distance learning and the application of cloud-based design and manufacturing (CBDM) have been studied and theorised.

Design/methodology/approach

A four-step methodology was adopted to analyse and categorise the papers obtained through various search engines. Out of 429 research articles, 72 papers were shortlisted for the detailed analysis.

Findings

Many factors that influence cloud computing technology adoption in the education sector have been identified in this paper. The research findings on several research items have been tabulated and discussed. Based on the theoretical research done on cloud computing for education, cloud computing for remote/distance learning and CBDM, cloud computing could enhance the educational systems in mainly developing countries and improve the scope for remote/distance learning.

Research limitations/implications

This study is limited to papers published only in the past decade from 2011 to 2020. Besides, this review was unable to include journal articles published in different languages. Nevertheless, for the effective teaching and learning process, this paper could help understand the importance and improve the process of adopting cloud computing concepts in educational universities and platforms.

Originality/value

This study is a novel one as a research review constituting cloud computing applications in education and extended for remote/distance learning and CBDM, which have not been studied in the existing knowledge base.

Article
Publication date: 14 January 2022

Femi Emmanuel Adeosun and Ayodeji Emmanuel Oke

In recent times, the construction industry is being influenced by technological innovations when delivering a better, more effective and efficient desired project, cyber-physical…

Abstract

Purpose

In recent times, the construction industry is being influenced by technological innovations when delivering a better, more effective and efficient desired project, cyber-physical systems (CPSs) offer a coupling of the physical and engineered systems by monitoring, coordinating, controlling and integrating their operations. This study aims to examine the level of awareness of professionals and usage of CPSs for construction projects in Nigerian construction industry.

Design/methodology/approach

The target population for this study was the professionals in the construction industry consisting Architects, Quantity Surveyors, Engineers and Builders. Data collection was through the use of a structured questionnaire administered to the target population. The data was analyzed by using statistical tools.

Findings

This study concluded that the construction professionals in the Nigerian construction industry are mostly aware about the heating, ventilation and air conditioning (HVAC) systems, global positioning system, microphone, speakers and camera as the most widely used CPSs in construction industry. HVAC systems was also found to be the mostly adopted technologies in the construction industry.

Originality/value

This study recommended that platforms that increase the awareness and encourage the usage of CPSs in construction industry should be encouraged by stakeholders concerned with management of construction projects. Such include electronic construction and adoption of blockchain technology.

Details

Journal of Engineering, Design and Technology , vol. 22 no. 1
Type: Research Article
ISSN: 1726-0531

Keywords

Article
Publication date: 22 April 2024

Qiqi Liu and Tingwu Yan

This paper investigates the ways digital media applications in rural areas have transformed the influence of social networks (SN) on farmers' adoption of various climate change…

Abstract

Purpose

This paper investigates the ways digital media applications in rural areas have transformed the influence of social networks (SN) on farmers' adoption of various climate change mitigation measures (CCMM), and explores the key mechanisms behind this transformation.

Design/methodology/approach

The study analyzes data from 1,002 farmers’ surveys. First, a logit model is used to measure the impact of SN on the adoption of different types of CCMM. Then, the interaction term between digital media usage (DMU) and SN is introduced to analyze the moderating effect of digital media on the impact of SN. Finally, a conditional process model is used to explore the mediating mechanism of agricultural socialization services (ASS) and the validity of information acquisition (VIA).

Findings

The results reveal that: (1) SN significantly promotes the adoption of CCMM and the marginal effect of this impact varies with different kinds of technologies. (2) DMU reinforces the effectiveness of SN in promoting farmers' adoption of CCMM. (3) The key mechanisms of the process in (2) are the ASS and the VIA.

Originality/value

This study shows that in the context of DMU, SN’s promotion effect on farmers' adoption of CCMM is strengthened.

Details

China Agricultural Economic Review, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1756-137X

Keywords

Article
Publication date: 16 June 2023

Parinda Doshi and Priti Nigam

The paper validates a framework using the media synchronicity theory (MST) to study the effect of Social Media Use at Work (SMUW) on the performance “Work Performance” (WP) of the…

Abstract

Purpose

The paper validates a framework using the media synchronicity theory (MST) to study the effect of Social Media Use at Work (SMUW) on the performance “Work Performance” (WP) of the employee. For this, the study initially observed the effect of SMUW on shared vision (SV), network ties (NT), and trust (TRUST) on the knowledge transfer (KT) and the effect of all (SV, NT, TRUST and KT) on the WP of the employees.

Design/methodology/approach

A survey method was used to collect responses from 157 employees working at middle and lower-level managerial positions in the chemical companies of India. The data analysis uses variance-based, partial least square SEM, which has established a relationship between the constructs.

Findings

The results found a significant effect of SMUW on the WP of the employees. It was observed that the SV and TRUST can be significantly improved with the help of SMUW, contributing to the KT and simultaneously affecting the WP of the employees.

Practical implications

The study has examined the positive and significant effect of SMUW on the employees' SV, NT and TRUST. Improving SV, NT and trust (dimension of social capital) through social media allows employees to transfer more knowledge. An increase in KT among the employees further positively affected the individual and group performance within the organization. SV positively affected the employee's WP, but NT and trust negatively affected the WP. The research thus provides useful insight to the managers for effective use of social media in the workplace.

Originality/value

The study used MST to understand the effect of the use of social media in the workplace. The study is kind of first in the Indian context which has examined the effect of employees at managerial level in chemical companies, and thus contributes to the existing literature on social networks/social media from the organizational context.

Details

Journal of Organizational Effectiveness: People and Performance, vol. 11 no. 1
Type: Research Article
ISSN: 2051-6614

Keywords

1 – 10 of over 3000