Search results

1 – 10 of 555
Open Access
Article
Publication date: 25 April 2022

Vuyokazi Precious Camngca, Christopher Amoah and Emma Ayesu-Koranteng

The construction industry’s daily processes demand heavy data usage and communication between project participants to meet client requirements. Thus, the application of…

2345

Abstract

Purpose

The construction industry’s daily processes demand heavy data usage and communication between project participants to meet client requirements. Thus, the application of information technology in project implementation has been increasing in the construction sector (CS) lately. However, the same cannot be seen in public sectors responsible for implementing government projects in South Africa. This study aimed to investigate the causes and effects of the underutilisation of information communication technology (ICT) in the building section of a public sector in a municipality in South Africa.

Design/methodology/approach

A qualitative approach was adopted for the study, using a public sector in one of the municipalities as a case study. Face-to-face interviews were conducted among the building unit workers, using unstructured interview questions. The data collected were analysed using the ATLAS.ti software.

Findings

The findings indicate a lack of understanding of existing and newly available ICT software and hardware technology among staff within the building technology due to lack of digitalisation in construction projects implementation, inadequate system upgrades, lack of adequate ICT resources, lack of financial resources for internet and software application subscriptions and lack of ICT training leading. The issues mentioned above have led to the outsourcing of projects professionals, slow pace of electronic emails, untrained professionals, usage of different and unlicensed software, resulting in the underutilisation of ICT within the whole building section. This change also adversely affects all officials, especially the junior officials who have graduated using the most recent ICT technology during their studies.

Research limitations/implications

The building department of only one public sector was used for the study; therefore, the findings may not be generalisable. The case study public sector’s name is withheld for confidentiality purposes.

Practical implications

Adequate change management and continuous development, combined with the allocation of proper resources, would be necessary for all staff members. Enormous investments had to be made in the ICT equipment by providing a sufficient budget in the building section of the public sectors. The building section within public sectors should provide change management to all aged skills staff by attending seminars to learn new ICT technology applied within its work environment.

Originality/value

The study established the causes of the underutilisation of ICT in the CS, especially in the public work departments and municipalities, and how this contributes to service delivery.

Details

Journal of Facilities Management , vol. 22 no. 1
Type: Research Article
ISSN: 1472-5967

Keywords

Open Access
Article
Publication date: 31 May 2023

Xiaojie Xu and Yun Zhang

For policymakers and participants of financial markets, predictions of trading volumes of financial indices are important issues. This study aims to address such a prediction…

Abstract

Purpose

For policymakers and participants of financial markets, predictions of trading volumes of financial indices are important issues. This study aims to address such a prediction problem based on the CSI300 nearby futures by using high-frequency data recorded each minute from the launch date of the futures to roughly two years after constituent stocks of the futures all becoming shortable, a time period witnessing significantly increased trading activities.

Design/methodology/approach

In order to answer questions as follows, this study adopts the neural network for modeling the irregular trading volume series of the CSI300 nearby futures: are the research able to utilize the lags of the trading volume series to make predictions; if this is the case, how far can the predictions go and how accurate can the predictions be; can this research use predictive information from trading volumes of the CSI300 spot and first distant futures for improving prediction accuracy and what is the corresponding magnitude; how sophisticated is the model; and how robust are its predictions?

Findings

The results of this study show that a simple neural network model could be constructed with 10 hidden neurons to robustly predict the trading volume of the CSI300 nearby futures using 1–20 min ahead trading volume data. The model leads to the root mean square error of about 955 contracts. Utilizing additional predictive information from trading volumes of the CSI300 spot and first distant futures could further benefit prediction accuracy and the magnitude of improvements is about 1–2%. This benefit is particularly significant when the trading volume of the CSI300 nearby futures is close to be zero. Another benefit, at the cost of the model becoming slightly more sophisticated with more hidden neurons, is that predictions could be generated through 1–30 min ahead trading volume data.

Originality/value

The results of this study could be used for multiple purposes, including designing financial index trading systems and platforms, monitoring systematic financial risks and building financial index price forecasting.

Details

Asian Journal of Economics and Banking, vol. 8 no. 1
Type: Research Article
ISSN: 2615-9821

Keywords

Open Access
Article
Publication date: 10 August 2023

Ricardo Chalmeta and Adriana M. Barbeito-Caamaño

This study aims to contribute to the field of computer systems for sustainability research. It proposes a framework for sustainability awareness using online social networks…

1152

Abstract

Purpose

This study aims to contribute to the field of computer systems for sustainability research. It proposes a framework for sustainability awareness using online social networks (OSNs) by analyzing major research streams of the current state of knowledge and different bibliometric variables, and identifies a future research agenda in the field.

Design/methodology/approach

The preferred reporting items for systematic review and meta-analysis (PRISMA) methodology, content analysis and bibliometric tools were employed to identify, select, collect, synthesize, analyze and evaluate all research published on sustainability awareness using OSNs to provide complete insight into this research area.

Findings

This study proposed a framework comprising four categories for sustainability awareness using OSNs. These four categories are: the key factors to success, analysis of existing tools, proposal of new methods, approaches and theoretical frameworks, and case examples. In addition, this study synthesized the future research challenges for each category of the proposed framework.

Originality/value

Fostering sustainability awareness and sustainable behavior using OSNs is a growing area of research that seeks cultural change in society to achieve sustainable development. Through OSNs, people can discover and become aware of the consequences of unsustainable practices and habits in society, and learn how to develop sustainable behavior.

Peer review

The peer review history for this article is available at https://publons.com/publon/10.1108/OIR

Details

Online Information Review, vol. 48 no. 2
Type: Research Article
ISSN: 1468-4527

Keywords

Open Access
Article
Publication date: 31 July 2020

Ado Adamou Abba Ari, Olga Kengni Ngangmo, Chafiq Titouna, Ousmane Thiare, Kolyang, Alidou Mohamadou and Abdelhak Mourad Gueroui

The Cloud of Things (IoT) that refers to the integration of the Cloud Computing (CC) and the Internet of Things (IoT), has dramatically changed the way treatments are done in the…

7019

Abstract

The Cloud of Things (IoT) that refers to the integration of the Cloud Computing (CC) and the Internet of Things (IoT), has dramatically changed the way treatments are done in the ubiquitous computing world. This integration has become imperative because the important amount of data generated by IoT devices needs the CC as a storage and processing infrastructure. Unfortunately, security issues in CoT remain more critical since users and IoT devices continue to share computing as well as networking resources remotely. Moreover, preserving data privacy in such an environment is also a critical concern. Therefore, the CoT is continuously growing up security and privacy issues. This paper focused on security and privacy considerations by analyzing some potential challenges and risks that need to be resolved. To achieve that, the CoT architecture and existing applications have been investigated. Furthermore, a number of security as well as privacy concerns and issues as well as open challenges, are discussed in this work.

Details

Applied Computing and Informatics, vol. 20 no. 1/2
Type: Research Article
ISSN: 2634-1964

Keywords

Open Access
Article
Publication date: 29 June 2023

Malathi Sivasankara Pillai and Kannan Balakrishnan

This paper aims to prove the following hypothesis Problem Statement: HYPOTHESIS (1) User Experience collection of mobile applications can be done using the Crowdsourcing…

Abstract

Purpose

This paper aims to prove the following hypothesis Problem Statement: HYPOTHESIS (1) User Experience collection of mobile applications can be done using the Crowdsourcing mechanism; (2) User Experience collection of mobile applications are influenced by the mindset of Crowdmembers, culture/ethnicity/social background, ease of interface use and rewards, among other factors.

Design/methodology/approach

The authors of this paper, did a literature review first to find if Crowdsourcing was applicable and a used method to solve problems in Software Engineering. This helped us to narrow down the application of Crowdsourcing to the Requirements Engineering-Usability (User Experience) collection. User experience collection of two Malayalam language-based mobile applications, AarogyaSetu and BevQ was done as the next step. Incorporating findings from Study I, another study using AarogyaSetu and Manglish was launched as Study II. The results from both cases were consolidated and analyzed. Significant concerns relating to expectations of Crowd members with User Experience collection were unraveled and the purpose of Study was accomplished.

Findings

(1) Crowdsourcing is and can be used in Software Engineering activities. (2) Crowd members have expectations (motivating factors) of User Interface and other elements that enable them to be an effective contributor. (3) An individual’s environment and mindset (character) are influential in him becoming a contributor in Crowdsourcing. (4) Culture and social practices of a region strongly affects the crowd-participating decision of an individual.

Originality/value

This is purely self-done work. The value of this research work is two-fold. Crowdsourcing is endorsed significant in Software Engineering tasks, especially in User Experience collection of mobile applications. Two, the Crowd service requesters can be careful about designing the questionnaire for Crowdsourcing. They have to be aware and prepared to meet the expectations of the Crowd. This can ensure the active participation of potential contributors. Future researchers can use the results of this work to base their research on similar purposes.

Details

Rajagiri Management Journal, vol. 18 no. 1
Type: Research Article
ISSN: 0972-9968

Keywords

Open Access
Article
Publication date: 2 January 2024

Eylem Thron, Shamal Faily, Huseyin Dogan and Martin Freer

Railways are a well-known example of complex critical infrastructure, incorporating socio-technical systems with humans such as drivers, signallers, maintainers and passengers at…

Abstract

Purpose

Railways are a well-known example of complex critical infrastructure, incorporating socio-technical systems with humans such as drivers, signallers, maintainers and passengers at the core. The technological evolution including interconnectedness and new ways of interaction lead to new security and safety risks that can be realised, both in terms of human error, and malicious and non-malicious behaviour. This study aims to identify the human factors (HF) and cyber-security risks relating to the role of signallers on the railways and explores strategies for the improvement of “Digital Resilience” – for the concept of a resilient railway.

Design/methodology/approach

Overall, 26 interviews were conducted with 21 participants from industry and academia.

Findings

The results showed that due to increased automation, both cyber-related threats and human error can impact signallers’ day-to-day operations – directly or indirectly (e.g. workload and safety-critical communications) – which could disrupt the railway services and potentially lead to safety-related catastrophic consequences. This study identifies cyber-related problems, including external threats; engineers not considering the human element in designs when specifying security controls; lack of security awareness among the rail industry; training gaps; organisational issues; and many unknown “unknowns”.

Originality/value

The authors discuss socio-technical principles through a hexagonal socio-technical framework and training needs analysis to mitigate against cyber-security issues and identify the predictive training needs of the signallers. This is supported by a systematic approach which considers both, safety and security factors, rather than waiting to learn from a cyber-attack retrospectively.

Details

Information & Computer Security, vol. 32 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

Open Access
Article
Publication date: 6 July 2023

Inma Rodríguez-Ardura, Antoni Meseguer-Artola and Qian Fu

An integrative model that predicts users' stickiness to WeChat is built. In the proposed model, perceived value plays a dual mediating role in the causal pathway from users'…

1910

Abstract

Purpose

An integrative model that predicts users' stickiness to WeChat is built. In the proposed model, perceived value plays a dual mediating role in the causal pathway from users' immersive experiences of presence and flow to their engagement and stickiness. Furthermore, presence is treated as a bi-dimensional construct made up of spatial feelings and the sense of being in company, and users' engagement is conceived as cognitive, affective and behavioural contributions to WeChat's marketing functions.

Design/methodology/approach

The authors develop a measurement instrument and analyse data from a survey of 917 WeChat users. They use a hybrid partial least squares-structural equation modelling (PLS-SEM) and neural network approach to confirm the reliability and validity of the measurement items and all the relationships between the constructs.

Findings

The paper provides robust evidence about the mediating influences of both utilitarian and hedonic value on users' engagement with the immersive experiences of presence and flow. An additional finding highlights the role of social norms in engagement and stickiness.

Originality/value

Rather than studying the effects of the immersive experiences of presence and flow from either a hedonic or a utilitarian perspective, the authors consider how immersive experiences shape both utilitarian and hedonic value, as well as their joint impact (along with that of social norms) on users' engagement and stickiness.

Details

Online Information Review, vol. 48 no. 2
Type: Research Article
ISSN: 1468-4527

Keywords

Open Access
Article
Publication date: 3 January 2024

Eloy Gil-Cordero, Pablo Ledesma-Chaves, Rocío Arteaga Sánchez and Ari Melo Mariano

The aim of this study is to examine the behavioral intention (BI) to adopt the Coinbase Wallet by Spanish users.

10860

Abstract

Purpose

The aim of this study is to examine the behavioral intention (BI) to adopt the Coinbase Wallet by Spanish users.

Design/methodology/approach

A survey was administered to individuals residing in Spain between March and April 2021. There were 301 questionnaires analyzed. This research applies a new predictive model based on technology acceptance model (TAM) 2, the unified theory of acceptance and use of technology (UTAUT) model, the theory of perceived risk and the commitment trust theory. A mixed partial least squares structural equation modeling (PLS-SEM)/fuzzy-set qualitative comparative analysis (fsQCA) methodology was employed for the modeling and data analysis.

Findings

The results showed that all the variables proposed have a direct and positive influence on the intention to use a Coinbase Wallet. The findings present clear directions for traders, investors and academics focused on improving their understanding of the characteristics of these markets.

Originality/value

First, this study addresses important concerns relating to the adoption of crypto-wallets during the global pandemic. Second, this research contributes to the existing literature by adding electronic word of mouth (e-WOM), trust, web quality and perceived risk as new drivers of the intention to use the Coinbase Wallet, providing unique and innovative insights. Finally, the study offers a solid methodological contribution by integrating linear (PLS) and nonlinear (fsQCA) techniques, showing that both methodologies provide a better understanding of the problem and a more detailed awareness of the patterns of antecedent factors.

Details

International Journal of Bank Marketing, vol. 42 no. 3
Type: Research Article
ISSN: 0265-2323

Keywords

Open Access
Article
Publication date: 11 May 2023

Marco D’Orazio, Gabriele Bernardini and Elisa Di Giuseppe

This paper aims to develop predictive methods, based on recurrent neural networks, useful to support facility managers in building maintenance tasks, by collecting information…

2710

Abstract

Purpose

This paper aims to develop predictive methods, based on recurrent neural networks, useful to support facility managers in building maintenance tasks, by collecting information coming from a computerized maintenance management system (CMMS).

Design/methodology/approach

This study applies data-driven and text-mining approaches to a CMMS data set comprising more than 14,500 end-users’ requests for corrective maintenance actions, collected over 14 months. Unidirectional long short-term memory (LSTM) and bidirectional LSTM (Bi-LSTM) recurrent neural networks are trained to predict the priority of each maintenance request and the related technical staff assignment. The data set is also used to depict an overview of corrective maintenance needs and related performances and to verify the most relevant elements in the building and how the current facility management (FM) relates to the requests.

Findings

The study shows that LSTM and Bi-LSTM recurrent neural networks can properly recognize the words contained in the requests, thus correctly and automatically assigning the priority and predicting the technical staff to assign for each end-user’s maintenance request. The obtained global accuracy is very high, reaching 93.3% for priority identification and 96.7% for technical staff assignment. Results also show the main critical building elements for maintenance requests and the related intervention timings.

Research limitations/implications

This work shows that LSTM and Bi-LSTM recurrent neural networks can automate the assignment process of end-users’ maintenance requests if trained with historical CMMS data. Results are promising; however, the trained LSTM and Bi-LSTM RNN can be applied only to different hospitals adopting similar categorization.

Practical implications

The data-driven and text-mining approaches can be integrated into the CMMS to support corrective maintenance management by facilities management contractors, i.e. to properly and timely identify the actions to be carried out and the technical staff to assign.

Social implications

The improvement of the maintenance of the health-care system is a key component of improving health service delivery. This work shows how to reduce health-care service interruptions due to maintenance needs through machine learning methods.

Originality/value

This study develops original methods and tools easily integrable into IT workflow systems (i.e. CMMS) in the FM field.

Open Access
Article
Publication date: 2 May 2023

Rukiye Orman, Elif Şi̇mşek and Meryem Ayşegül Kozak Çakır

Micro-credentials, which have been widely used in re-skilling and skills development, provide advantages for improvement in the professional career. As a complementary approach to…

2932

Abstract

Purpose

Micro-credentials, which have been widely used in re-skilling and skills development, provide advantages for improvement in the professional career. As a complementary approach to career and professional development in formal education, it can be said that micro-credentials are preferred for supporting professional development and/or to acquiring new skills to find a job in a new field (Fisher and Leder, 2022). This study aims to provide a detailed perspective on conceptual framework and the use of micro-credentials in higher education.

Design/methodology/approach

Many questions have arisen regarding micro-credentials, applicability, quality assurance, inclusion in formal educational settings and how to include them in traditional education systems, especially in higher education institutions. Oliver (2019) emphasizes that there is little research on micro-credentials or their derivatives in the literature. There is still uncertainty on micro-credential on behalf of students, employers or employees. In addition, although there are studies on micro-credentials in the USA, Europe and Australia, there is very little research around countries such as Turkey (Yilik, 2021). This study discusses the use of micro-credentials in the world and their reflections on higher education.

Findings

As it is shown in this article, micro-credentials have the potential to challenge or complement traditional ways of how learning is taking place, understood, recognized and certified. Research on micro-credentials is still in its infancy and could benefit a lot from more research. Especially research on employers' recognition and appreciation of digital credentials needs to be studied. Also, empirically confirming propositions of literature on micro-credentials could be beneficial.

Originality/value

This study is original in terms of discussing the use of micro-credential in the world and their reflections on higher education and presenting suggestions on this subject.

Details

Higher Education Evaluation and Development, vol. 17 no. 2
Type: Research Article
ISSN: 2514-5789

Keywords

Access

Only Open Access

Year

Last 6 months (555)

Content type

Article (555)
1 – 10 of 555