Search results
1 – 10 of 136Anas M.M. Awad, Ketut Wikantika, Haytham Ali, Sohaib K.M. Abujayyab and Javad Hashempour
The rapid development of urban areas in Sleman District, Indonesia, has created new challenges for firefighting response services. One of the primary challenges is to identify the…
Abstract
Purpose
The rapid development of urban areas in Sleman District, Indonesia, has created new challenges for firefighting response services. One of the primary challenges is to identify the optimal locations for new fire stations, to improve service quality and maximize service coverage within the specified time.
Design/methodology/approach
This paper proposes a method for precisely calculating travel time that integrates delay time caused by traffic lights, intersections and congestion. The study highlights the importance of precise calculation of travel time in order to provide a more accurate understanding of the service area covered by the fire stations. The proposed method utilizes network analysis in ArcGIS, the analytical hierarchy process (AHP) and simple additive weighting (SAW) to accurately calculate travel time and to identify the best locations for new fire stations. The identification of new site was based on service safety, service quality, service costs and demographic factors and applied to the Sleman district in Indonesia.
Findings
The results showed that the total area covered by old and new fire stations decreased from 61% to 31.8% of the study area when the adjusted default speed scenario was implemented.
Practical implications
The results indicated that the default speed scenario could provide misleading information about the service area, while the adjusted default speed scenario improved service quality and maximized service coverage.
Originality/value
The proposed method provides decision-makers with an effective tool to make informed decisions on optimal locations for new fire stations and thus enhance emergency response and public safety.
Details
Keywords
Derek L. Nazareth, Jae Choi and Thomas Ngo-Ye
This paper aims to examine the conditions under which small and medium enterprises (SMEs) invest in security services when they migrate their e-commerce applications to the cloud…
Abstract
Purpose
This paper aims to examine the conditions under which small and medium enterprises (SMEs) invest in security services when they migrate their e-commerce applications to the cloud environment. Using a risk management perspective, the paper assesses the impact of security service pricing, security incident prevalence and virulence to estimate SME security spending at the market level and draw out implications for SMEs and security service providers.
Design/methodology/approach
Security risks are inherently characterized by uncertainty. This study uses a Monte Carlo approach to understand the role of uncertainty in the decision to adopt security services. A model relating key security constructs is assembled based on key constructs from the domain. By manipulating security service costs and security incident types, the model estimates the market-level adoption of services, security incidents and damages incurred, along with measures of their relative dispersion.
Findings
Three key findings emerge from this study. First, adoption of services and protection is higher when tiered security services are provided, indicating that SMEs prefer to choose their security services rather than accept uniformly priced products. Second, SMEs are considered price-sensitive, resulting in a maximum level of spending in the market. Third, results indicate that security incidents and damages can be much higher than the mean in some cases, and this should serve as a cautionary note to SMEs.
Originality/value
Security spending has been modeled at the firm level. Adopting a market-level perspective represents a novel contribution. Additionally, the Monte Carlo approach provides managers with tangible measures of uncertainty, affording additional information and insight when making security service adoption decisions.
Details
Keywords
Rahadian Haryo Bayu Sejati, Dermawan Wibisono and Akbar Adhiutama
This paper aims to design a hybrid model of knowledge-based performance management system (KBPMS) for facilitating Lean Six-Sigma (L6s) application to increase contractor…
Abstract
Purpose
This paper aims to design a hybrid model of knowledge-based performance management system (KBPMS) for facilitating Lean Six-Sigma (L6s) application to increase contractor productivity without compromising human safety in Indonesian upstream oil field operations that manage ageing and life extension (ALE) facilities.
Design/methodology/approach
The research design applies a pragmatic paradigm by employing action research strategy with qualitative-quantitative methodology involving 385 of 1,533 workers. The KBPMS-L6s conceptual framework is developed and enriched with the Analytical Hierarchy Process (AHP) to prioritize fit-for-purpose Key Performance Indicators. The application of L6s with Human Performance Modes analysis is used to provide a statistical baseline approach for pre-assessment of the contractor’s organizational capabilities. A comprehensive literature review is given for the main pillars of the contextual framework.
Findings
The KBPMS-L6s concept has given an improved hierarchy for strategic and operational levels to achieve a performance benchmark to manage ALE facilities in Indonesian upstream oil field operations. To increase quality management practices in managing ALE facilities, the L6s application requires an assessment of the organizational capability of contractors and an analysis of Human Performance Modes (HPM) to identify levels of construction workers’ productivity based on human competency and safety awareness that have never been done in this field.
Research limitations/implications
The action research will only focus on the contractors’ productivity and safety performances that are managed by infrastructure maintenance programs for managing integrity of ALE facilities in Indonesian upstream of oil field operations. Future research could go toward validating this approach in other sectors.
Practical implications
This paper discusses the implications of developing the hybrid KBPMS- L6s enriched with AHP methodology and the application of HPM analysis to achieve a 14% reduction in inefficient working time, a 28% reduction in supervision costs, a 15% reduction in schedule completion delays, and a 78% reduction in safety incident rates of Total Recordable Incident Rate (TRIR), Days Away Restricted or Job Transfer (DART) and Motor Vehicle Crash (MVC), as evidence of achieving fit-for-purpose KPIs with safer, better, faster, and at lower costs.
Social implications
This paper does not discuss social implications
Originality/value
This paper successfully demonstrates a novel use of Knowledge-Based system with the integration AHP and HPM analysis to develop a hybrid KBPMS-L6s concept that successfully increases contractor productivity without compromising human safety performance while implementing ALE facility infrastructure maintenance program in upstream oil field operations.
Details
Keywords
Princely Ifinedo, Francine Vachon and Anteneh Ayanso
This paper aims to increase understanding of pertinent exogenous and endogenous antecedents that can reduce data privacy breaches.
Abstract
Purpose
This paper aims to increase understanding of pertinent exogenous and endogenous antecedents that can reduce data privacy breaches.
Design/methodology/approach
A cross-sectional survey was used to source participants' perceptions of relevant exogenous and endogenous antecedents developed from the Antecedents-Privacy Concerns-Outcomes (APCO) model and Social Cognitive Theory. A research model was proposed and tested with empirical data collected from 213 participants based in Canada.
Findings
The exogenous factors of external privacy training and external privacy self-assessment tool significantly and positively impact the study's endogenous factors of individual privacy awareness, organizational resources allocated to privacy concerns, and group behavior concerning privacy laws. Further, the proximal determinants of data privacy breaches (dependent construct) are negatively influenced by individual privacy awareness, group behavior related to privacy laws, and organizational resources allocated to privacy concerns. The endogenous factors fully mediated the relationships between the exogenous factors and the dependent construct.
Research limitations/implications
This study contributes to the budding data privacy breach literature by highlighting the impacts of personal and environmental factors in the discourse.
Practical implications
The results offer management insights on mitigating data privacy breach incidents arising from employees' actions. Roles of external privacy training and privacy self-assessment tools are signified.
Originality/value
Antecedents of data privacy breaches have been underexplored. This paper is among the first to elucidate the roles of select exogenous and endogenous antecedents encompassing personal and environmental imperatives on data privacy breaches.
Details
Keywords
This paper aims to provide an overview of South African perspectives on preventing, monitoring and combating hate victimisation, towards informing international understandings.
Abstract
Purpose
This paper aims to provide an overview of South African perspectives on preventing, monitoring and combating hate victimisation, towards informing international understandings.
Design/methodology/approach
Using a general review approach, this paper provides a historical examination of measures proposed by the South African Government and civil society since 1994, to prevent, monitor and combat hate crime, hate speech and intentional unfair discrimination.
Findings
Regardless of a constitutional commitment to social inclusion, diversity and minority rights, significant progress remains lacking after almost three decades of related advocacy, lobbying and limited government intervention. Findings of the South African Hate Crimes Working Group (HCWG) longitudinal Monitoring Project emphasise the need for decisive legal responses to hate victimisation.
Social implications
A Bill, recognising hate crime and hate speech as distinct criminal offences, has been in development for almost 15 years and will soon serve before Parliament. Enactment of this legislation will be ground-breaking in Africa.
Originality/value
This paper contributes to the field of hate studies by providing an overview of the journey towards current conceptual understandings of hate in (South) Africa. It sets the stage for evaluating the potential of the redesigned HCWG monitoring tool, which holds promise for early identification and intervention in hate hotspots and targeted sectors. This instrument can establish trends not only in South Africa but also across the African continent.
Details
Keywords
Pedro G.C. Pio, Tiago Sigahi, Izabela Simon Rampasso, Eduardo Guilherme Satolo, Milena Pavan Serafim, Osvaldo L.G. Quelhas, Walter Leal Filho and Rosley Anholon
This paper compares traditional and digital banks in nine categories of complaints and provides insights to improve complaint management performance.
Abstract
Purpose
This paper compares traditional and digital banks in nine categories of complaints and provides insights to improve complaint management performance.
Design/methodology/approach
A sample of the major Brazilian banks was defined, with four traditional and four digital banks. The grey relational analysis (GRA) method was applied as an analytical tool to compare the most frequent complaints of traditional and digital banks. The most critical complaints identified were considered to discuss potential improvements in complaint management using quality and service management system concepts.
Findings
The GRA method enabled the development of a ranking of nine complaint categories, considering the uncertainty involved in the data and differentiating between traditional and digital banks. The most critical complaint categories, regardless of business model, were “unauthorized charges” and “poor service,” which were ranked first and second in the frequency rankings. Traditional and digital banks differed the most in the complaint category “unfair charge,” ranking third and eighth in the rankings, respectively.
Practical implications
Managers from traditional and digital banks can improve complaint management performance by applying ISO 9001 and ISO 20000 concepts such as incident, problem, change, service level, availability, capacity, information technology service continuity and financial management.
Social implications
The study's findings can help bank managers improve service levels in the face of technological competition. Improving these organizations is an important factor for developing countries such as Brazil.
Originality/value
This paper reveals the differences between two business models regarding complaint management. It also considers a methodological approach to include the uncertainty related to customers' perception and subjectivity inherent to complaints.
Details
Keywords
Mohammad A. Hassanain and Zayed A. Albugami
Community centers play a socio-economic and urban role of combining different communal necessities, that serve inhabitants, at different neighborhoods in cities. Their role…
Abstract
Purpose
Community centers play a socio-economic and urban role of combining different communal necessities, that serve inhabitants, at different neighborhoods in cities. Their role emerged in importance as being a hub for improving and customizing quality of life experiences of the public. This research presents a code-based risk assessment tool for evaluating fire safety measures that can be adapted in the context of community centers. It also provides an exemplary case study to demonstrate its application.
Design/methodology/approach
The study identified the factors that render community centers as a high-risk type of facilities in fire events. Various fire codes and standards were reviewed to describe the relevant fire safety measures. A code-based fire risk assessment tool was developed and implemented, through a case study. A set of recommendations were developed to improve the fire safety conditions of the case study facility.
Findings
Several violations to fire safety were identified in the case study building. The findings led to identifying a set of recommendations to improve its fire safety conditions.
Practical implications
This research introduced a systematic approach to raise awareness about fire incidences and consequences in community centers, and provides facilities managers with a tool, to assess compliance based on international fire code requirements.
Originality/value
In fire events, community centers are considered as high-risk facilities that may lead to significant losses of human lives and damages to assets. It is significant to study the causes of fire, for ensuring effective prevention and safe operations.
Details
Keywords
The Kingdom of Saudi Arabia (KSA) is embracing digital transformation and e-government services, aiming to improve efficiency, accessibility and citizen-centricity. Nonetheless…
Abstract
Purpose
The Kingdom of Saudi Arabia (KSA) is embracing digital transformation and e-government services, aiming to improve efficiency, accessibility and citizen-centricity. Nonetheless, the country faces challenges such as evolving cyber threats. The purpose of this study is to investigate the factors influencing cybersecurity practices to ensure the reliability and security of e-government services.
Design/methodology/approach
This paper investigates the multifaceted dynamics of cybersecurity practices and their impact on the quality and effectiveness of e-government services. Five key factors explored include organizational culture, technology infrastructure, adherence to standards and regulations, employee training and awareness and financial investment in cybersecurity. This study used a quantitative method to gather data from 320 participants. The researcher collected 285 completed questionnaires, excluding unusable or incomplete responses, and analyzed the final data set using partial least squares structural equation modeling.
Findings
The findings show that financial investment in cybersecurity, employee training and awareness and adherence to cybersecurity regulations significantly influence the adoption of robust cybersecurity practices. However, the relationship between organizational culture and cybersecurity practices is less straightforward. The research establishes a strong positive correlation between cybersecurity practices and e-government service quality, highlighting the role of security in fostering public trust and user satisfaction and meeting the evolving needs of citizens and businesses.
Originality/value
This research contributes valuable empirical evidence to the fields of e-government and cybersecurity, offering insights that can inform evidence-based policy decisions and resource allocation. By understanding the nuanced dynamics at play, Saudi Arabia is better poised to fortify its digital governance infrastructure and provide secure, high-quality e-government services to its constituents.
Details
Keywords
Prashan Bandara Wijesinghe and Prasanna Illankoon
The purpose of this study was to improve the overall equipment effectiveness (OEE) of the production process of the shredder operation of ABC company, an industrial waste…
Abstract
Purpose
The purpose of this study was to improve the overall equipment effectiveness (OEE) of the production process of the shredder operation of ABC company, an industrial waste management company which supplies pre-processed industrial waste as alternative fuel to a cement plant.
Design/methodology/approach
This case study investigated all possible availability and performance losses that caused the shredder system’s OEE and various problem-solving techniques, such as root cause analysis and Pareto analysis, were used to find the root cause of the reduced OEE.
Findings
After analysing this case study, three significant loss factors were identified from all the availability and performance losses, which caused the shredder system’s OEE losses. Practical solutions were found for the effect of those loss factors to improve the machine’s OEE and productivity.
Research limitations/implications
This case study has been concentrated on only analysing of losses and improvement of OEE in the production process and not about cost analysis between loss and improvements.
Originality/value
This paper shows how to improve the OEE of a production process through various problem-solving techniques by identifying its losses and how to achieve the best solutions for those losses in a practical manner.
Details
Keywords
Andrea Herrera and Sonia Camacho
This paper aims to empirically investigate how knowledge coordination is carried out within and across expert teams in the outsourcing service desk context from the standpoint of…
Abstract
Purpose
This paper aims to empirically investigate how knowledge coordination is carried out within and across expert teams in the outsourcing service desk context from the standpoint of the information and communication technologies (ICT) provider.
Design/methodology/approach
The authors draw on an embedded case study to unravel the mechanisms used by expert teams to achieve knowledge coordination. Data collection included semi-structured interviews and document analysis over eight months.
Findings
Four groups of coordination mechanisms were found according to their nature and role in helping MESA achieve its organizational goals. The authors also identified how this set of mechanisms responds to the task-resource dependency and how it evolves over time to provide reliable ICT services. Furthermore, the analysis of four knowledge coordination dimensions inside each group uncovers the complexity of coordination in the studied context, with the “who” dimension being predominant across the groups. The analysis further reveals that the content (what) and mode of coordination (how) of each group respond to elements in the knowledge coordination process relevant for the different stages of the ICT service delivery process.
Originality/value
The case study addresses how people in outsourced services coordinate their knowledge to manage the interdependencies among the involved organizations and thus, achieving their goals. This study extends previous research that had analyzed the consequences of knowledge coordination for providers and customers by delving into the mechanisms used in this process from the provider’s point of view.
Details