Search results
1 – 10 of 23The interview explores the Live Enterprise model at Infosys. The idea is to enable mature companies to transform into a business with digital native agility, with many small teams…
Abstract
Purpose
The interview explores the Live Enterprise model at Infosys. The idea is to enable mature companies to transform into a business with digital native agility, with many small teams innovating while leveraging shared digital infrastructure, in an environment of continuous evolution and learning.
Design/methodology/approach
Jeff Kavanaugh, Vice President and Global Head of Infosys Knowledge Institute, the research and thought leadership arm of Infosys, explains how the model promotes rapid experimentation through the digital runway, innovation at the edges by distributed micro-teams and extreme automation at scale for repeatable processes and functions. He and co-author Rafee Tarafdar describe the inner workings of this model in their new book “The Live Enterprise: Create a Continuously Evolving and Learning Organization”.
Findings
Outcomes are made possible by four capabilities: hybrid talent, a design-to-evolve mindset, a digital runway and a ‘micro is the new mega’ approach to transformational change.
Practical implications
Micro is the new mega because the Live Enterprise model uses frequent micro-change releases at scale in short sprints. The cumulative effect of these many small changes compounds quickly to transformational change
Originality/value
Essential reading for executives at mature companies who need to compete in the new digital environment. Offers such revolutionary ideas as: Employee experience (EX) is as important as customer experience (CX) in the live enterprise
Siti Salbiah Zainal Abidin and Mohd Heikal Husin
Document management system is an essential approach that should be managed well to ensure an effective and faster overall working process in an organization. Hardcopy documents…
Abstract
Document management system is an essential approach that should be managed well to ensure an effective and faster overall working process in an organization. Hardcopy documents has been one of the items that most organizations need to manage in a safe and secure manner due to the high dependency on most of their working procedure especially in government organizations. Hence, we proposed a new framework to improve the weaknesses of the existing document management procedures in government organizations. Our proposed framework integrates the implementation of an NFC system in this research due to its secure short - range communication, and the peer-to-peer communication capability in most mobile devices. Besides that, most existing government organizations within Malaysia could easily implement such technology for their internal usage as this technology is cost effective due to its availability on existing mobile devices on most Android based devices.
Details
Keywords
Edward Ayebeng Botchway, Kofi Agyekum, Hayford Pittri and Anthony Lamina
This study explores the importance of and vulnerabilities in deploying physical access control (PAC) devices in a typical university setting.
Abstract
Purpose
This study explores the importance of and vulnerabilities in deploying physical access control (PAC) devices in a typical university setting.
Design/methodology/approach
The study adopts face-to-face and telephone interviews. This study uses a semi-structured interview guide to solicit the views of 25 interviewees on the subject under consideration. Qualitative responses to the interview are thematically analyzed using NVivo 11 Pro analysis application software.
Findings
The findings reveal five importance and seven vulnerabilities in the deployment of PAC devices in the institution. Key among the importance of deploying the devices are “prevent unwanted premise access or intrusions,” “prevent disruptions to university/staff operations on campus” and “protect students and staff from outside intruders.” Key among the identified vulnerabilities are “tailgating”, “delay in emergent cases” and “power outage may affect its usage.”
Originality/value
This study offers insight into a rare area of study, especially in the Sub-Saharan Africa region. Furthermore, the study contributes to the state-of-the-art importance and vulnerabilities in deploying PAC devices in daily human activities. The study is valuable in that it has the potential to establish a foundation for future studies that may delve into investigating issues associated with the deployment of PAC devices.
Details
Keywords
Blockchain, which was originally created to enable peer-to-peer digital payment systems (bitcoin), is considered to have several benefits for different sectors, such as the real…
Abstract
Purpose
Blockchain, which was originally created to enable peer-to-peer digital payment systems (bitcoin), is considered to have several benefits for different sectors, such as the real estate one. In a standard European-wide real estate transaction, several intermediaries are involved. As a consequence, these agreements are usually time-consuming and involve extra difficulties to cross-border operations. As blockchain, combined with smart contracts, may have an important role in these transactions, this paper aims to explore its prospective challenges, limitations and opportunities in the real estate sector and discover how the traditional intermediaries have to face a possible implementation of this technology.
Design/methodology/approach
This paper analyses the current intermediaries in the real estate sector in European Union (EU), their functions and how can blockchain strengthen the security of these transactions while reducing their time. The author uses a legal methodology to approach it.
Findings
Blockchain, combined with smart contracts, has both challenges and opportunities for the real estate sector. On the one hand, it may improve procedures, allow EU transactions and the interconnection between public administration. However, to not reduce parties rights, this blockchain should have some special features, such as the possibility of being amended.
Originality/value
This paper provides a valuable overview of all the intermediaries that could be affected by blockchain protocols. It is of interest of blockchain developers, public administrations and researchers who are working on blockchain and property conveyancing.
Details
Keywords
Since the European Union’s (EU) Charter of Fundamental Rights became binding in 2009, data protection has attained the status of a fundamental right (Article 8) throughout the EU…
Abstract
Since the European Union’s (EU) Charter of Fundamental Rights became binding in 2009, data protection has attained the status of a fundamental right (Article 8) throughout the EU. This chapter discusses the relevance of data protection in the context of security. It shows that data protection has been of particular relevance in the German context – not only against the backdrop of rapidly evolving information technology, but also of the historical experiences with political regimes collecting information in order to oppress citizens.
Details
Keywords
The future construction site will be pervasive, context aware and embedded with intelligence. The purpose of this paper is to explore and define the concept of the digital skin of…
Abstract
Purpose
The future construction site will be pervasive, context aware and embedded with intelligence. The purpose of this paper is to explore and define the concept of the digital skin of the future smart construction site.
Design/methodology/approach
The paper provides a systematic and hierarchical classification of 114 articles from both industry and academia on the digital skin concept and evaluates them. The hierarchical classification is based on application areas relevant to construction, such as augmented reality, building information model-based visualisation, labour tracking, supply chain tracking, safety management, mobile equipment tracking and schedule and progress monitoring. Evaluations of the research papers were conducted based on three pillars: validation of technological feasibility, onsite application and user acceptance testing.
Findings
Technologies learned about in the literature review enabled the envisaging of the pervasive construction site of the future. The paper presents scenarios for the future context-aware construction site, including the construction worker, construction procurement management and future real-time safety management systems.
Originality/value
Based on the gaps identified by the review in the body of knowledge and on a broader analysis of technology diffusion, the paper highlights the research challenges to be overcome in the advent of digital skin. The paper recommends that researchers follow a coherent process for smart technology design, development and implementation in order to achieve this vision for the construction industry.
Details
Keywords
Julia Slupska and Leonie Maria Tanczer
Technology-facilitated abuse, so-called “tech abuse,” through phones, trackers, and other emerging innovations, has a substantial impact on the nature of intimate partner violence…
Abstract
Technology-facilitated abuse, so-called “tech abuse,” through phones, trackers, and other emerging innovations, has a substantial impact on the nature of intimate partner violence (IPV). The current chapter examines the risks and harms posed to IPV victims/survivors from the burgeoning Internet of Things (IoT) environment. IoT systems are understood as “smart” devices such as conventional household appliances that are connected to the internet. Interdependencies between different products together with the devices' enhanced functionalities offer opportunities for coercion and control. Across the chapter, we use the example of IoT to showcase how and why tech abuse is a socio-technological issue and requires not only human-centered (i.e., societal) but also cybersecurity (i.e., technical) responses. We apply the method of “threat modeling,” which is a process used to investigate potential cybersecurity attacks, to shift the conventional technical focus from the risks to systems toward risks to people. Through the analysis of a smart lock, we highlight insufficiently designed IoT privacy and security features and uncover how seemingly neutral design decisions can constrain, shape, and facilitate coercive and controlling behaviors.
Details
Keywords
Alfonso Alfonsi and Maresa Berliri
This chapter, based on a sociological approach, addresses the ethical issues of surveillance research from the perspective of the profound transformations that science and…
Abstract
This chapter, based on a sociological approach, addresses the ethical issues of surveillance research from the perspective of the profound transformations that science and innovation are undergoing, as part of a broader shift from modern to post-modern society, affecting also other major social institutions (such as government, religion, family, and public administration). The change occurring in the science and technology system is characterised by diminishing authority, uncertainty about internal mechanisms and standards, and a declining and increasingly difficult access to resources. Such changes, also related to globalisation and new digital technologies, have transformed the way research is conducted and disseminated. Research is now more open and its results more easily accessible to citizens.
Scientific research is also put under increased public scrutiny, while, at the same time, public distrust and disaffection towards science is rising. In such a context, it is more important than ever to make sure that research activities are not compromised by fraudulent and unethical practices. The legitimate expectations of citizens to enjoy their rights, including the ability to protect their private sphere, are growing. Scientific and technological development is deeply interrelated with the widespread awareness of these rights and the possibility of exercising them, but it produces also new risks, while a widespread sense of insecurity increases. The digital revolution, while improving people’s quality of life, offers at the same time new opportunities for crime and terrorism, which in turn has produced a demand to strengthen security systems through increasingly advanced and intrusive surveillance technologies. Misconduct in the field of surveillance may not only undermine the quality of research, but also further impair society’s trust in research and science as well as in the State and its institutions.
Details
Keywords
Pakorn Opasvitayarux, Siri-on Setamanit, Nuttapol Assarut and Krisana Visamitanan
The introduction of quality management Internet of things (QM IoT) can help food supply chain members to enhance real-time visibility, quality, safety and efficiency of products…
Abstract
Purpose
The introduction of quality management Internet of things (QM IoT) can help food supply chain members to enhance real-time visibility, quality, safety and efficiency of products and processes. Current literature indicates three main research gaps, including a lack of studies in QM IoT in the food supply chain, the vagueness of integrative adoption of new technology framework and deficient research covering both adoption attitude and intention in the same model. This study aims to propose an analysis model based on the technological–organizational–environmental (TOE) framework and reinforced by the collaborative structure to capture the importance of the supply chain network.
Design/methodology/approach
The partial least square-structural equation modeling (PLS-SEM) was applied to test the impacts of the adoption factors on QM IoT adoption attitude and intention among 197 respondents in food manufacturing in Thailand.
Findings
The results indicated that compatibility, trialability, adaptive capacity, innovative capability, executive support, value chain partner pressure, presence of service provider and information sharing significantly impacted the attitude toward QM IoT adoption, while adaptive capability, innovative capability and information sharing directly influenced the QM IoT adoption intention. Furthermore, the attitude toward QM IoT adoption positively impacted the QM IoT adoption intention.
Practical implications
This study contributed to academicians by proposing a more solid adoption framework for QM IoT area. In addition, the business practitioners could actively prepare themselves for the QM IoT adoption, whereas the service providers could provide better and suitable service.
Originality/value
This research contributes to the building of a more solid framework and indicates significant factors that impact the attitude toward QM IoT adoption and adoption intention.
Details
Keywords
Md. Tanvir Alam Himel, Shahrin Ashraf, Tauhid Ahmed Bappy, Md Tanaz Abir, Md Khaled Morshed and Md. Nazmul Hossain
While the usage of mobile financial services (MFSs) is increasing rapidly in developing countries, research on users' attitudes and behavioral intention to adopt MFS is limited…
Abstract
Purpose
While the usage of mobile financial services (MFSs) is increasing rapidly in developing countries, research on users' attitudes and behavioral intention to adopt MFS is limited. Thus, this study aims to investigate customers' attitudes and intentions to adopt MFS from a Bangladeshi perspective.
Design/methodology/approach
A mixed research design was employed to conduct this study. Data of 196 respondents were analyzed using partial least squares (PLS) path modeling. For the quantitative part, data collection was conducted using non-probability sampling through a structured survey questionnaire. A focus group discussion with ten MFS users from divergent backgrounds was conducted to validate the quantitative findings.
Findings
This paper integrated both the technology acceptance model (TAM) and innovation resistance theory (IRT) to validate the results. The authors found that perceived usefulness (PU), perceived ease of use (PEOU) and perceived trust (PT) positively contribute to customers' attitudes toward MFS adoption. Besides, barriers to acceptance had unfavorable effects on users' attitudes and usage intentions. Furthermore, a focus group discussion revealed valuable insights on the constructs used in this study.
Practical implications
The study results have implications for both MFS providers and researchers. The outputs and recommendations presented in this paper will encourage the MFS practitioners to stimulate users' attitudes and behavioral intentions by ensuring useful, easy to use, credible and risk-free mobile payment platforms.
Originality/value
This is one of the very few studies in Bangladesh that have taken a contemporary and emerging research topic, providing theoretical, methodological and practical contributions regarding the determinants and consequences of attitude toward using MFSs.
Details