Search results

1 – 10 of over 1000
Article
Publication date: 21 February 2024

Azra Rafique, Kanwal Ameen and Alia Arshad

This study aims to explore the evidence-based usage patterns of higher education commission (HEC) subscribed e-journal databases in the university digital library used by the…

Abstract

Purpose

This study aims to explore the evidence-based usage patterns of higher education commission (HEC) subscribed e-journal databases in the university digital library used by the scholarly community and the academics’ online searching behaviour at a higher education institution in Pakistan.

Design/methodology/approach

The study used an explanatory sequential mixed methods approach. Raw transaction log data were collected for quantitative analysis, and the interview technique was used for qualitative data collection and thematic analysis.

Findings

Log analysis revealed that HEC subscribed databases were used significantly, and among those, scholarly databases covering various subjects were more frequently used than subject-specific society-based databases. Furthermore, the users frequently accessed the needed e-journal articles through search engines like Google and Google Scholar, considering them sources of free material instead of the HEC subscribed databases.

Practical implications

It provides practical implications for examining the evidence-based use patterns of e-journal databases. It suggests the need for improving the access management of HEC databases, keeping in view the usage statistics and the demands of the scholars. The study may also help create market venues for the publishers of scholarly databases by offering attractive and economical packages for researchers of various disciplines in developing and underdeveloped countries. The study results also guide the information professionals to arrange orientation and information literacy programs to improve the searching behaviour of their less frequent users and enhance the utilization of these subscribed databases.

Originality/value

The study is part of a PhD project and, to the best of the authors’ knowledge, is the first such work in the context of a developing country like Pakistan.

Details

Global Knowledge, Memory and Communication, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2514-9342

Keywords

Article
Publication date: 3 March 2023

Shing Cheong Hui, Ming Yung Kwok, Elaine W.S. Kong and Dickson K.W. Chiu

Although cloud storage services can bring users valuable convenience, they can be technically complex and intrinsically insecure. Therefore, this research explores the concerns of…

Abstract

Purpose

Although cloud storage services can bring users valuable convenience, they can be technically complex and intrinsically insecure. Therefore, this research explores the concerns of academic users regarding cloud security and technical issues and how such problems may influence their continuous use in daily life.

Design/methodology/approach

This qualitative study used a semi-structured interview approach comprising six main open-ended questions to explore the information security and technical issues for the continuous use of cloud storage services by 20 undergraduate students in Hong Kong.

Findings

The analysis revealed cloud storage service users' major security and technical concerns, particularly synchronization and backup issues, were the most significant technical barrier to the continuing personal use of cloud storage services.

Originality/value

Existing literature has focused on how cloud computing services could bring benefits and security and privacy-related risks to organizations rather than security and technical issues of personal use, especially in the Asian academic context.

Details

Library Hi Tech, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0737-8831

Keywords

Article
Publication date: 4 September 2023

Eka Rastiyanto Amrullah, Hironobu Takeshita and Hiromi Tokuda

The agricultural extension system in Indonesia has experienced its ups and downs in line with the sociopolitical dynamics of the country. This study examines the impact of access…

Abstract

Purpose

The agricultural extension system in Indonesia has experienced its ups and downs in line with the sociopolitical dynamics of the country. This study examines the impact of access to agricultural extension on the adoption of technology and farm income of smallholder farmers in Banten, Indonesia.

Design/methodology/approach

This study uses a quasi-experimental research design to estimate the impact outcomes at the farm level, with methods that form part of the counterfactual framework.

Findings

Estimation results show that farming experience, off-farm income, irrigation, group membership, mobile phones and livestock ownership significantly affect extension access. The results of this main study show the important role of extension access to technology adoption and agricultural income. These studies found consistently positive and statistically significant effects of access to extension services on technology adoption and farm income.

Research limitations/implications

The consistent positive and significant effect of extension access implies that public investment by the government in agricultural extension can optimize the potential impact on technology adoption and agricultural income, which also affects the distribution of the welfare of rural smallholder farmers.

Originality/value

Agricultural extension as a key to increasing technology adoption. However, the impact of access to agricultural extension in Indonesia has received less attention in terms of adoption and farm income.

Details

Journal of Agribusiness in Developing and Emerging Economies, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2044-0839

Keywords

Article
Publication date: 1 February 2024

David Hedberg, Martin Lundgren and Marcus Nohlberg

This study aims to explore auto mechanics awareness of repairs and maintenance related to the car’s cybersecurity and provide insights into challenges based on current practice.

Abstract

Purpose

This study aims to explore auto mechanics awareness of repairs and maintenance related to the car’s cybersecurity and provide insights into challenges based on current practice.

Design/methodology/approach

This study is based on an empirical study consisting of semistructured interviews with representatives from both branded and independent auto workshops. The data was analyzed using thematic analysis. A version of the capability maturity model was introduced to the respondents as a self-evaluation of their cybersecurity awareness.

Findings

Cybersecurity was not found to be part of the current auto workshop work culture, and that there is a gap between independent workshops and branded workshops. Specifically, in how they function, approach problems and the tools and support available to them to resolve (particularly regarding previously unknown) issues.

Research limitations/implications

Only auto workshop managers in Sweden were interviewed for this study. This role was picked because it is the most likely to have come in contact with cybersecurity-related issues. They may also have discussed the topic with mechanics, manufacturers or other auto workshops – thus providing a broader view of potential issues or challenges.

Practical implications

The challenges identified in this study offers actionable advice to car manufacturers, branded workshops and independent workshops. The goal is to further cooperation, improve knowledge sharing and avoid unnecessary safety or security issues.

Originality/value

As cars become smarter, they also become potential targets for cyberattacks, which in turn poses potential threats to human safety. However, research on auto workshops, which has previously ensured that cars are road safe, has received little research attention with regards to the role cybersecurity can play in repairs and maintenance. Insights from auto workshops can therefore shed light upon the unique challenges and issues tied to the cybersecurity of cars, and how they are kept up-to-date and road safe in the digital era.

Details

Information & Computer Security, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 26 December 2023

Jiajun Tan, Wai Peng Wong, Chee Keong Tan, Suriyan Jomthanachai and Chee Peng Lim

Technology is the lifeline for the logistics industry, and it has been immensely disrupted by the emerging blockchain technology. This paper has two main objectives. The first is…

Abstract

Purpose

Technology is the lifeline for the logistics industry, and it has been immensely disrupted by the emerging blockchain technology. This paper has two main objectives. The first is to explore how the current blockchain technology can be implemented in the logistics industry with the aim of improving logistic services amongst the network of logistics service providers (LSPs). The second is to propose the development of a blockchain model for the small and medium logistics service supply chain.

Design/methodology/approach

A prototype blockchain-based logistics system has been created and tested in a case study with a real logistics company. The primary technologies for developing a blockchain model on the Hyperledger platform as well as how the system is designed based on the logistics service flow are explained.

Findings

The study has resulted in the successful implementation of the proposed prototype blockchain-based logistics system. In particular, the case company has managed to fully utilise the developed tracking and tracing system. Whilst utilising the prototype, the participants have been able to fulfil their responsibilities in an effective manner. The performance of LSPs has improved following the World Bank Logistics Performance Index (LPI) criteria.

Originality/value

This paper contributes to current research in the application of blockchain technologies in the domain of logistics and the supply chain to progress LSPs towards Logistics 4.0. The current frameworks for Logistics 4.0 and how blockchain as a disruptive technology revolutionises logistic services are reviewed. In addition, this paper highlights the benefits of blockchain technology that LSPs can leverage to further improve their performance based on the LPI criteria.

Details

Asia Pacific Journal of Marketing and Logistics, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1355-5855

Keywords

Article
Publication date: 22 April 2024

Ana Condeço-Melhorado, Juan Carlos García-Palomares and Javier Gutiérrez

The COVID-19 pandemic has significantly impacted global tourism, with international travel bearing the burden of restrictions. Domestic tourism has also faced substantial…

Abstract

Purpose

The COVID-19 pandemic has significantly impacted global tourism, with international travel bearing the burden of restrictions. Domestic tourism has also faced substantial challenges. This paper aims to analyse the impact of the COVID-19 pandemic on domestic tourism in Spain, focusing on travel from Madrid (the country’s capital) to other tourist destinations.

Design/methodology/approach

Mobile phone data has been used to study the evolution of tourist trips over the summers of 2019, 2020 and 2021. Regression models are used to explain the number of visitors at destinations.

Findings

The pandemic not only caused a drastic drop in tourist flows but also disrupted the overall pattern of the domestic flow system. Winning destinations were typically areas in proximity to Madrid and less densely populated destinations, while urban destinations were major losers. The preferences of domestic tourists varied notably by income group, but the decrease in trip volumes showed only marginal differences.

Originality/value

The paper demonstrates the potential of mobile phone data analysis to study the uneven impact of external shocks, such as the COVID-19 pandemic, on tourist destinations. This approach considers spatial resilience heterogeneity within regions or provinces. By incorporating income information, the analysis introduces a social dimension to highly detailed spatial data, surpassing traditional studies conducted at the regional or national levels.

研究目的

COVID-19大流行对全球旅游业产生了重大影响,国际旅行受到了限制的影响最为严重。国内旅游也面临着重大挑战。本文分析了COVID-19大流行对西班牙国内旅游的影响,重点关注从马德里(该国首都)到其他旅游目的地的旅行。

研究方法

本研究使用移动电话数据研究了2019年、2020年和2021年夏季旅游出行的演变。采用回归模型解释了各目的地游客数量。

研究发现

大流行不仅导致了旅游流量急剧下降,还扰乱了国内流动系统的总体模式。获胜的目的地通常是马德里附近的地区和人口较稀少的目的地,而城市目的地是主要的输家。国内游客的偏好在收入群体之间有明显差异,但旅行量的减少只显示出边际差异。

研究创新

本文展示了使用移动电话数据分析研究外部冲击(如COVID-19大流行)对旅游目的地的不均匀影响的潜力。该方法考虑了区域或省份内的空间弹性异质性。通过整合收入信息,该分析为高度详细的空间数据引入了社会维度,超越了传统在区域或国家水平进行的研究。

Details

Journal of Hospitality and Tourism Technology, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1757-9880

Keywords

Article
Publication date: 30 October 2023

Sally Helen Stone and Laura Sanderson

This paper considers the exhibition: UnDoing. This research-through-curation project examined interactions within existing spaces and situations. This established links between…

Abstract

Purpose

This paper considers the exhibition: UnDoing. This research-through-curation project examined interactions within existing spaces and situations. This established links between the selected exhibits, the gallery, the city and with the continuum of the previous exhibition.

Design/methodology/approach

Carefully selected architects, designers and artists were invited to contribute—those who pursued a contextual approach; whose practice explored the way buildings, places and artefacts are reused, reinterpreted and remembered.

Findings

Through the act of curation, this research uncovered a series of different approaches to constructed sites and existing buildings, from layered juxtaposition, the refusal to undo, to interventions of new elements within architectural works.

Research limitations/implications

Curation offered the opportunity to consider works of architecture and of art through the same lens, for direct comparisons to be made and the influence of one upon the other to be comprehended.

Practical implications

The examination processes the architect employs is similar to that of the artist; the development of an understanding of place, and from this synthesis, creative interpretation. However, despite the similarities in the starting position, the elucidation developed by the artist can be vastly different to that of the architect.

Social implications

The juxtaposition and new classifications created by the exhibition encouraged visitors to look at art, architecture and the city in a different way; to grasp the direct link between the different subjects; and the possibilities created.

Originality/value

The two driving factors for UnDoing were places of previous occupation and the city of Manchester. The qualities of surrounding constructed environment combined were combined with attitudes towards existing structures and places.

Details

Journal of Cultural Heritage Management and Sustainable Development, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2044-1266

Keywords

Article
Publication date: 26 June 2023

Chetna Choudhary, Deepti Mehrotra and Avinash K. Shrivastava

As the number of web applications is increasing day by day web mining acts as an important tool to extract useful information from weblogs and analyse them according to the…

Abstract

Purpose

As the number of web applications is increasing day by day web mining acts as an important tool to extract useful information from weblogs and analyse them according to the attributes and predict the usage of a website. The main aim of this paper is to inspect how process mining can be used to predict the web usability of hotel booking sites based on the number of users on each page, and the time of stay of each user. Through this paper, the authors analyse the web usability of a website through process mining by finding the web usability metrics. This work proposes an approach to finding the usage of a website using the attributes available in the weblog which predicts the actual footfall on a website.

Design/methodology/approach

PROM (Process Mining tool) is used for the analysis of the event log of a hotel booking site. In this work, authors have used a case study to apply the PROM (process mining tool) to pre-process the event log dataset for analysis to discover better-structured process maps than without pre-processing.

Findings

This article first provided an overview of process mining, then focused on web mining and later discussed process mining techniques. It also described different target languages: system nets (i.e. Petri nets with an initial and a final state), inductive miner and heuristic miner, graphs showing the change in behaviour of the dataset and predicting the outcome, that is the webpage having the maximum number of hits.

Originality/value

In this work, a case study has been used to apply the PROM (process mining tool) to pre-process the event log dataset for analysis to discover better-structured process maps than without pre-processing.

Details

International Journal of Quality & Reliability Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0265-671X

Keywords

Article
Publication date: 22 August 2022

Ratnmala Nivrutti Bhimanpallewar, Sohail Imran Khan, K. Bhavana Raj, Kamal Gulati, Narinder Bhasin and Roop Raj

Federation analytics approaches are a present area of study that has already progressed beyond the analysis of metrics and counts. It is possible to acquire aggregated information…

34

Abstract

Purpose

Federation analytics approaches are a present area of study that has already progressed beyond the analysis of metrics and counts. It is possible to acquire aggregated information about on-device data by training machine learning models using federated learning techniques without any of the raw data ever having to leave the devices in the issue. Web browser forensics research has been focused on individual Web browsers or architectural analysis of specific log files rather than on broad topics. This paper aims to propose major tools used for Web browser analysis.

Design/methodology/approach

Each kind of Web browser has its own unique set of features. This allows the user to choose their preferred browsers or to check out many browsers at once. If a forensic examiner has access to just one Web browser's log files, he/she makes it difficult to determine which sites a person has visited. The agent must thus be capable of analyzing all currently available Web browsers on a single workstation and doing an integrated study of various Web browsers.

Findings

Federated learning has emerged as a training paradigm in such settings. Web browser forensics research in general has focused on certain browsers or the computational modeling of specific log files. Internet users engage in a wide range of activities using an internet browser, such as searching for information and sending e-mails.

Originality/value

It is also essential that the investigator have access to user activity when conducting an inquiry. This data, which may be used to assess information retrieval activities, is very critical. In this paper, the authors purposed a major tool used for Web browser analysis. This study's proposed algorithm is capable of protecting data privacy effectively in real-world experiments.

Details

International Journal of Pervasive Computing and Communications, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1742-7371

Keywords

Open Access
Article
Publication date: 23 February 2024

Vanessa Honson, Thuy Vu, Tich Phuoc Tran and Walter Tejada Estay

Large class sizes are becoming the norm in higher education against concerns of dropping learning qualities. To maintain the standard of learning and add value, one of the common…

Abstract

Purpose

Large class sizes are becoming the norm in higher education against concerns of dropping learning qualities. To maintain the standard of learning and add value, one of the common strategies is for the course convenor to proactively monitor student engagement with learning activities against their assessment outcomes and intervene timely. Learning analytics has been increasingly adopted to provide these insights into student engagement and their performance. This case study explores how learning analytics can be used to meet the convenor’s requirements and help reduce administrative workload in a large health science class at the University of New South Wales.

Design/methodology/approach

This case-based study adopts an “action learning research approach” in assessing ways of using learning analytics for reducing workload in the educator’s own context and critically reflecting on experiences for improvements. This approach emphasises reflexive methodology, where the educator constantly assesses the context, implements an intervention and reflects on the process for in-time adjustments, improvements and future development.

Findings

The results highlighted ease for the teacher towards the early “flagging” of students who may not be active within the learning management system or who have performed poorly on assessment tasks. Coupled with the ability to send emails to the “flagged” students, this has led to a more personal approach while reducing the number of steps normally required. An unanticipated outcome was the potential for additional time saving through improving the scaffolding mechanisms if the learning analytics were customisable for individual courses.

Originality/value

The results provide further benefits for learning analytics to assist the educator in a growing blended learning environment. They also reveal the potential for learning analytics to be an effective adjunct towards promoting personal learning design.

Details

Journal of Work-Applied Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2205-2062

Keywords

1 – 10 of over 1000