Search results
1 – 10 of over 1000Azra Rafique, Kanwal Ameen and Alia Arshad
This study aims to explore the evidence-based usage patterns of higher education commission (HEC) subscribed e-journal databases in the university digital library used by the…
Abstract
Purpose
This study aims to explore the evidence-based usage patterns of higher education commission (HEC) subscribed e-journal databases in the university digital library used by the scholarly community and the academics’ online searching behaviour at a higher education institution in Pakistan.
Design/methodology/approach
The study used an explanatory sequential mixed methods approach. Raw transaction log data were collected for quantitative analysis, and the interview technique was used for qualitative data collection and thematic analysis.
Findings
Log analysis revealed that HEC subscribed databases were used significantly, and among those, scholarly databases covering various subjects were more frequently used than subject-specific society-based databases. Furthermore, the users frequently accessed the needed e-journal articles through search engines like Google and Google Scholar, considering them sources of free material instead of the HEC subscribed databases.
Practical implications
It provides practical implications for examining the evidence-based use patterns of e-journal databases. It suggests the need for improving the access management of HEC databases, keeping in view the usage statistics and the demands of the scholars. The study may also help create market venues for the publishers of scholarly databases by offering attractive and economical packages for researchers of various disciplines in developing and underdeveloped countries. The study results also guide the information professionals to arrange orientation and information literacy programs to improve the searching behaviour of their less frequent users and enhance the utilization of these subscribed databases.
Originality/value
The study is part of a PhD project and, to the best of the authors’ knowledge, is the first such work in the context of a developing country like Pakistan.
Details
Keywords
Shing Cheong Hui, Ming Yung Kwok, Elaine W.S. Kong and Dickson K.W. Chiu
Although cloud storage services can bring users valuable convenience, they can be technically complex and intrinsically insecure. Therefore, this research explores the concerns of…
Abstract
Purpose
Although cloud storage services can bring users valuable convenience, they can be technically complex and intrinsically insecure. Therefore, this research explores the concerns of academic users regarding cloud security and technical issues and how such problems may influence their continuous use in daily life.
Design/methodology/approach
This qualitative study used a semi-structured interview approach comprising six main open-ended questions to explore the information security and technical issues for the continuous use of cloud storage services by 20 undergraduate students in Hong Kong.
Findings
The analysis revealed cloud storage service users' major security and technical concerns, particularly synchronization and backup issues, were the most significant technical barrier to the continuing personal use of cloud storage services.
Originality/value
Existing literature has focused on how cloud computing services could bring benefits and security and privacy-related risks to organizations rather than security and technical issues of personal use, especially in the Asian academic context.
Details
Keywords
Eka Rastiyanto Amrullah, Hironobu Takeshita and Hiromi Tokuda
The agricultural extension system in Indonesia has experienced its ups and downs in line with the sociopolitical dynamics of the country. This study examines the impact of access…
Abstract
Purpose
The agricultural extension system in Indonesia has experienced its ups and downs in line with the sociopolitical dynamics of the country. This study examines the impact of access to agricultural extension on the adoption of technology and farm income of smallholder farmers in Banten, Indonesia.
Design/methodology/approach
This study uses a quasi-experimental research design to estimate the impact outcomes at the farm level, with methods that form part of the counterfactual framework.
Findings
Estimation results show that farming experience, off-farm income, irrigation, group membership, mobile phones and livestock ownership significantly affect extension access. The results of this main study show the important role of extension access to technology adoption and agricultural income. These studies found consistently positive and statistically significant effects of access to extension services on technology adoption and farm income.
Research limitations/implications
The consistent positive and significant effect of extension access implies that public investment by the government in agricultural extension can optimize the potential impact on technology adoption and agricultural income, which also affects the distribution of the welfare of rural smallholder farmers.
Originality/value
Agricultural extension as a key to increasing technology adoption. However, the impact of access to agricultural extension in Indonesia has received less attention in terms of adoption and farm income.
Details
Keywords
David Hedberg, Martin Lundgren and Marcus Nohlberg
This study aims to explore auto mechanics awareness of repairs and maintenance related to the car’s cybersecurity and provide insights into challenges based on current practice.
Abstract
Purpose
This study aims to explore auto mechanics awareness of repairs and maintenance related to the car’s cybersecurity and provide insights into challenges based on current practice.
Design/methodology/approach
This study is based on an empirical study consisting of semistructured interviews with representatives from both branded and independent auto workshops. The data was analyzed using thematic analysis. A version of the capability maturity model was introduced to the respondents as a self-evaluation of their cybersecurity awareness.
Findings
Cybersecurity was not found to be part of the current auto workshop work culture, and that there is a gap between independent workshops and branded workshops. Specifically, in how they function, approach problems and the tools and support available to them to resolve (particularly regarding previously unknown) issues.
Research limitations/implications
Only auto workshop managers in Sweden were interviewed for this study. This role was picked because it is the most likely to have come in contact with cybersecurity-related issues. They may also have discussed the topic with mechanics, manufacturers or other auto workshops – thus providing a broader view of potential issues or challenges.
Practical implications
The challenges identified in this study offers actionable advice to car manufacturers, branded workshops and independent workshops. The goal is to further cooperation, improve knowledge sharing and avoid unnecessary safety or security issues.
Originality/value
As cars become smarter, they also become potential targets for cyberattacks, which in turn poses potential threats to human safety. However, research on auto workshops, which has previously ensured that cars are road safe, has received little research attention with regards to the role cybersecurity can play in repairs and maintenance. Insights from auto workshops can therefore shed light upon the unique challenges and issues tied to the cybersecurity of cars, and how they are kept up-to-date and road safe in the digital era.
Details
Keywords
Jiajun Tan, Wai Peng Wong, Chee Keong Tan, Suriyan Jomthanachai and Chee Peng Lim
Technology is the lifeline for the logistics industry, and it has been immensely disrupted by the emerging blockchain technology. This paper has two main objectives. The first is…
Abstract
Purpose
Technology is the lifeline for the logistics industry, and it has been immensely disrupted by the emerging blockchain technology. This paper has two main objectives. The first is to explore how the current blockchain technology can be implemented in the logistics industry with the aim of improving logistic services amongst the network of logistics service providers (LSPs). The second is to propose the development of a blockchain model for the small and medium logistics service supply chain.
Design/methodology/approach
A prototype blockchain-based logistics system has been created and tested in a case study with a real logistics company. The primary technologies for developing a blockchain model on the Hyperledger platform as well as how the system is designed based on the logistics service flow are explained.
Findings
The study has resulted in the successful implementation of the proposed prototype blockchain-based logistics system. In particular, the case company has managed to fully utilise the developed tracking and tracing system. Whilst utilising the prototype, the participants have been able to fulfil their responsibilities in an effective manner. The performance of LSPs has improved following the World Bank Logistics Performance Index (LPI) criteria.
Originality/value
This paper contributes to current research in the application of blockchain technologies in the domain of logistics and the supply chain to progress LSPs towards Logistics 4.0. The current frameworks for Logistics 4.0 and how blockchain as a disruptive technology revolutionises logistic services are reviewed. In addition, this paper highlights the benefits of blockchain technology that LSPs can leverage to further improve their performance based on the LPI criteria.
Details
Keywords
Ana Condeço-Melhorado, Juan Carlos García-Palomares and Javier Gutiérrez
The COVID-19 pandemic has significantly impacted global tourism, with international travel bearing the burden of restrictions. Domestic tourism has also faced substantial…
Abstract
Purpose
The COVID-19 pandemic has significantly impacted global tourism, with international travel bearing the burden of restrictions. Domestic tourism has also faced substantial challenges. This paper aims to analyse the impact of the COVID-19 pandemic on domestic tourism in Spain, focusing on travel from Madrid (the country’s capital) to other tourist destinations.
Design/methodology/approach
Mobile phone data has been used to study the evolution of tourist trips over the summers of 2019, 2020 and 2021. Regression models are used to explain the number of visitors at destinations.
Findings
The pandemic not only caused a drastic drop in tourist flows but also disrupted the overall pattern of the domestic flow system. Winning destinations were typically areas in proximity to Madrid and less densely populated destinations, while urban destinations were major losers. The preferences of domestic tourists varied notably by income group, but the decrease in trip volumes showed only marginal differences.
Originality/value
The paper demonstrates the potential of mobile phone data analysis to study the uneven impact of external shocks, such as the COVID-19 pandemic, on tourist destinations. This approach considers spatial resilience heterogeneity within regions or provinces. By incorporating income information, the analysis introduces a social dimension to highly detailed spatial data, surpassing traditional studies conducted at the regional or national levels.
研究目的
COVID-19大流行对全球旅游业产生了重大影响,国际旅行受到了限制的影响最为严重。国内旅游也面临着重大挑战。本文分析了COVID-19大流行对西班牙国内旅游的影响,重点关注从马德里(该国首都)到其他旅游目的地的旅行。
研究方法
本研究使用移动电话数据研究了2019年、2020年和2021年夏季旅游出行的演变。采用回归模型解释了各目的地游客数量。
研究发现
大流行不仅导致了旅游流量急剧下降,还扰乱了国内流动系统的总体模式。获胜的目的地通常是马德里附近的地区和人口较稀少的目的地,而城市目的地是主要的输家。国内游客的偏好在收入群体之间有明显差异,但旅行量的减少只显示出边际差异。
研究创新
本文展示了使用移动电话数据分析研究外部冲击(如COVID-19大流行)对旅游目的地的不均匀影响的潜力。该方法考虑了区域或省份内的空间弹性异质性。通过整合收入信息,该分析为高度详细的空间数据引入了社会维度,超越了传统在区域或国家水平进行的研究。
Details
Keywords
Sally Helen Stone and Laura Sanderson
This paper considers the exhibition: UnDoing. This research-through-curation project examined interactions within existing spaces and situations. This established links between…
Abstract
Purpose
This paper considers the exhibition: UnDoing. This research-through-curation project examined interactions within existing spaces and situations. This established links between the selected exhibits, the gallery, the city and with the continuum of the previous exhibition.
Design/methodology/approach
Carefully selected architects, designers and artists were invited to contribute—those who pursued a contextual approach; whose practice explored the way buildings, places and artefacts are reused, reinterpreted and remembered.
Findings
Through the act of curation, this research uncovered a series of different approaches to constructed sites and existing buildings, from layered juxtaposition, the refusal to undo, to interventions of new elements within architectural works.
Research limitations/implications
Curation offered the opportunity to consider works of architecture and of art through the same lens, for direct comparisons to be made and the influence of one upon the other to be comprehended.
Practical implications
The examination processes the architect employs is similar to that of the artist; the development of an understanding of place, and from this synthesis, creative interpretation. However, despite the similarities in the starting position, the elucidation developed by the artist can be vastly different to that of the architect.
Social implications
The juxtaposition and new classifications created by the exhibition encouraged visitors to look at art, architecture and the city in a different way; to grasp the direct link between the different subjects; and the possibilities created.
Originality/value
The two driving factors for UnDoing were places of previous occupation and the city of Manchester. The qualities of surrounding constructed environment combined were combined with attitudes towards existing structures and places.
Details
Keywords
Chetna Choudhary, Deepti Mehrotra and Avinash K. Shrivastava
As the number of web applications is increasing day by day web mining acts as an important tool to extract useful information from weblogs and analyse them according to the…
Abstract
Purpose
As the number of web applications is increasing day by day web mining acts as an important tool to extract useful information from weblogs and analyse them according to the attributes and predict the usage of a website. The main aim of this paper is to inspect how process mining can be used to predict the web usability of hotel booking sites based on the number of users on each page, and the time of stay of each user. Through this paper, the authors analyse the web usability of a website through process mining by finding the web usability metrics. This work proposes an approach to finding the usage of a website using the attributes available in the weblog which predicts the actual footfall on a website.
Design/methodology/approach
PROM (Process Mining tool) is used for the analysis of the event log of a hotel booking site. In this work, authors have used a case study to apply the PROM (process mining tool) to pre-process the event log dataset for analysis to discover better-structured process maps than without pre-processing.
Findings
This article first provided an overview of process mining, then focused on web mining and later discussed process mining techniques. It also described different target languages: system nets (i.e. Petri nets with an initial and a final state), inductive miner and heuristic miner, graphs showing the change in behaviour of the dataset and predicting the outcome, that is the webpage having the maximum number of hits.
Originality/value
In this work, a case study has been used to apply the PROM (process mining tool) to pre-process the event log dataset for analysis to discover better-structured process maps than without pre-processing.
Details
Keywords
Ratnmala Nivrutti Bhimanpallewar, Sohail Imran Khan, K. Bhavana Raj, Kamal Gulati, Narinder Bhasin and Roop Raj
Federation analytics approaches are a present area of study that has already progressed beyond the analysis of metrics and counts. It is possible to acquire aggregated information…
Abstract
Purpose
Federation analytics approaches are a present area of study that has already progressed beyond the analysis of metrics and counts. It is possible to acquire aggregated information about on-device data by training machine learning models using federated learning techniques without any of the raw data ever having to leave the devices in the issue. Web browser forensics research has been focused on individual Web browsers or architectural analysis of specific log files rather than on broad topics. This paper aims to propose major tools used for Web browser analysis.
Design/methodology/approach
Each kind of Web browser has its own unique set of features. This allows the user to choose their preferred browsers or to check out many browsers at once. If a forensic examiner has access to just one Web browser's log files, he/she makes it difficult to determine which sites a person has visited. The agent must thus be capable of analyzing all currently available Web browsers on a single workstation and doing an integrated study of various Web browsers.
Findings
Federated learning has emerged as a training paradigm in such settings. Web browser forensics research in general has focused on certain browsers or the computational modeling of specific log files. Internet users engage in a wide range of activities using an internet browser, such as searching for information and sending e-mails.
Originality/value
It is also essential that the investigator have access to user activity when conducting an inquiry. This data, which may be used to assess information retrieval activities, is very critical. In this paper, the authors purposed a major tool used for Web browser analysis. This study's proposed algorithm is capable of protecting data privacy effectively in real-world experiments.
Details
Keywords
Vanessa Honson, Thuy Vu, Tich Phuoc Tran and Walter Tejada Estay
Large class sizes are becoming the norm in higher education against concerns of dropping learning qualities. To maintain the standard of learning and add value, one of the common…
Abstract
Purpose
Large class sizes are becoming the norm in higher education against concerns of dropping learning qualities. To maintain the standard of learning and add value, one of the common strategies is for the course convenor to proactively monitor student engagement with learning activities against their assessment outcomes and intervene timely. Learning analytics has been increasingly adopted to provide these insights into student engagement and their performance. This case study explores how learning analytics can be used to meet the convenor’s requirements and help reduce administrative workload in a large health science class at the University of New South Wales.
Design/methodology/approach
This case-based study adopts an “action learning research approach” in assessing ways of using learning analytics for reducing workload in the educator’s own context and critically reflecting on experiences for improvements. This approach emphasises reflexive methodology, where the educator constantly assesses the context, implements an intervention and reflects on the process for in-time adjustments, improvements and future development.
Findings
The results highlighted ease for the teacher towards the early “flagging” of students who may not be active within the learning management system or who have performed poorly on assessment tasks. Coupled with the ability to send emails to the “flagged” students, this has led to a more personal approach while reducing the number of steps normally required. An unanticipated outcome was the potential for additional time saving through improving the scaffolding mechanisms if the learning analytics were customisable for individual courses.
Originality/value
The results provide further benefits for learning analytics to assist the educator in a growing blended learning environment. They also reveal the potential for learning analytics to be an effective adjunct towards promoting personal learning design.
Details