Search results

1 – 10 of 26
Article
Publication date: 11 January 2024

Susan Mathew K., Jovin K. Joy and Sheeja N.K.

This study aims to present recent trends in touchscreen research through scientometric analysis. Devices with touchscreen are powerful tools for performing specialized operations…

Abstract

Purpose

This study aims to present recent trends in touchscreen research through scientometric analysis. Devices with touchscreen are powerful tools for performing specialized operations. The touch screens of tablets, smartphones, laptops and television play an important role in teaching, learning and research.

Design/methodology/approach

The data was collected from Web of Science database from 2011 to 2021 and analysed using MS-Excel and VOSviewer software. After analysing 389 research papers, the authors identified the high impact journals, collaboration of countries, institutions, authors and growth trend of publications. Analysing the most used keywords, country-wise distribution of publications and research collaboration between institutions will help interpret the research trends in the selected time span.

Findings

The publications show an increase in number over the years from 2011 to 2021. Among the countries, USA has the highest number of 127 articles published, followed by England (61) and Canada (30). The results showed that the multiple authorship pattern in touchscreen publication is high when compared to single authors. The institutional analysis indicated that the organizations publishing more than five documents in the area were mostly from United Kingdom, Australia, USA and Korea. Timeline visualizations identified prominent keywords like touchscreen, performance, operant platform, Alzheimer’s disease, etc. in the subject. Interdisciplinary research is dominant in the subject, as seen from the most preferred journals and keywords.

Research limitations/implications

The analysis does not include a comprehensive coverage of the research output, as only Web of Science database from 2011 to 2021 in a 10-year period is included.

Practical implications

The study would benefit stakeholders, including manufacturers and researchers alike, to know the future of touchscreen research.

Social implications

This study is pertinent to socio-psychological fields because touchscreen technology encourages social connection among older persons and may help foster early literacy skills.

Originality/value

This paper will provide an understanding of the global developments in touchscreen research with recommendations for future research.

Details

Information Discovery and Delivery, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2398-6247

Keywords

Article
Publication date: 2 February 2024

Alireza Moghayedi, Kathy Michell, Karen Le Jeune and Mark Massyn

Safety and security (S&S) are critical concerns in South Africa, especially in Cape Town, one of the country’s most crime-ridden cities. The University of Cape Town (UCT)…

Abstract

Purpose

Safety and security (S&S) are critical concerns in South Africa, especially in Cape Town, one of the country’s most crime-ridden cities. The University of Cape Town (UCT), situated on a large, open campus, has experienced increased malefaction. Facilities management (FM) services at universities bear the primary responsibility for providing S&S to their communities. To comprehensively understand and address the community’s demands regarding S&S, the current study was conducted to investigate the challenges specific to open universities. This study aims to determine whether implementing community-based FM (CbFM) principles and using technological innovations could offer a more effective and sustainable solution.

Design/methodology/approach

The study adopted interpretivist overarching case study methodology, which is ontologically based. A mixed-method approach was used to incorporate the strengths and limitations of the weaknesses of both methods. The data collection took the form of an online survey of the university community and semi-structured interviews with university executive management to obtain data from the single case study of UCT. Descriptive statistics were used to analyze the quantitative data, and thematic analysis was used to identify emergent themes from the qualitative data.

Findings

The study presents an overall view of the provision of S&S at UCT, the unique challenges faced by management and the main S&S issues affecting the community. Moreover, the study reveals that UCT has implemented community participation processes in the past with limited success. This is because the strategies implemented constitute a narrow perspective of community participation. Therefore, a much smarter and more inclusive perspective using technological innovation is required for successful community participation to occur and to be successfully used in providing S&S toward achieving future-proofing facilities.

Originality/value

This research has demonstrated the influence of CbFM and innovative technologies on the S&S of the open campus. Hence, future-proof facilities can be achieved when FM actively engages university communities in managing campuses through technological innovation.

Open Access
Article
Publication date: 17 August 2023

Shengnan Han, Shahrokh Nikou and Workneh Yilma Ayele

To improve the academic integrity of online examinations, digital proctoring systems have recently been implemented in higher education institutions (HEIs). The paper aims to…

1492

Abstract

Purpose

To improve the academic integrity of online examinations, digital proctoring systems have recently been implemented in higher education institutions (HEIs). The paper aims to understand how digital proctoring has been practised in higher education (HE) and proposes future research directions for studying digital proctoring in HE.

Design/methodology/approach

A systematic literature review was conducted. The PRISMA procedure was adapted for the literature search. The topics were identified by topic modelling techniques from 154 relevant publications in seven databases.

Findings

Seven widely discussed topics in literature were identified, including solutions for detecting cheating and student authentication, challenges/issues of uptakes and students' performance in different proctoring environments.

Research limitations/implications

This paper provides insights for academics, policymakers, practitioners and students to understand the implementation of digital proctoring in academia, its adoption by HEIs, impacts on students' and educators' performance and the rapid increase in its use for digital exams in HEIs, with particular emphasis on the impacts of the systems on digitalising examinations in HE.

Originality/value

This review paper has systematically and critically described the state-of-the-art literature on digital proctoring in HE and provides useful insights and implications for future research on digital proctoring, and how academic integrity in online examinations can be enhanced, along with digitalising HE.

Details

International Journal of Educational Management, vol. 38 no. 1
Type: Research Article
ISSN: 0951-354X

Keywords

Open Access
Article
Publication date: 1 June 2023

Edward Ayebeng Botchway, Kofi Agyekum, Hayford Pittri and Anthony Lamina

This study explores the importance of and vulnerabilities in deploying physical access control (PAC) devices in a typical university setting.

Abstract

Purpose

This study explores the importance of and vulnerabilities in deploying physical access control (PAC) devices in a typical university setting.

Design/methodology/approach

The study adopts face-to-face and telephone interviews. This study uses a semi-structured interview guide to solicit the views of 25 interviewees on the subject under consideration. Qualitative responses to the interview are thematically analyzed using NVivo 11 Pro analysis application software.

Findings

The findings reveal five importance and seven vulnerabilities in the deployment of PAC devices in the institution. Key among the importance of deploying the devices are “prevent unwanted premise access or intrusions,” “prevent disruptions to university/staff operations on campus” and “protect students and staff from outside intruders.” Key among the identified vulnerabilities are “tailgating”, “delay in emergent cases” and “power outage may affect its usage.”

Originality/value

This study offers insight into a rare area of study, especially in the Sub-Saharan Africa region. Furthermore, the study contributes to the state-of-the-art importance and vulnerabilities in deploying PAC devices in daily human activities. The study is valuable in that it has the potential to establish a foundation for future studies that may delve into investigating issues associated with the deployment of PAC devices.

Details

Frontiers in Engineering and Built Environment, vol. 4 no. 1
Type: Research Article
ISSN: 2634-2499

Keywords

Article
Publication date: 9 May 2023

Ali Abdallah Alalwan, Abdullah M. Baabdullah, Mutaz M. Al-Debei, Ramakrishnan Raman, Hitmi Khalifa Alhitmi, Amjad A. Abu-ElSamen and Yogesh K. Dwivedi

There is always a need to discover how a paradox between a customer’s desire for a more personalized experience and their privacy and security concerns would shape their intention…

Abstract

Purpose

There is always a need to discover how a paradox between a customer’s desire for a more personalized experience and their privacy and security concerns would shape their intention to continue using contactless payment methods. However, personalization–privacy paradox has not been well-covered over the area of contactless payment. Therefore, this study aims to empirically examine the impact of personalization–privacy paradox on the customers’ continued intention (CIN) to use contactless payment.

Design

/methodology/approach – The empirical part of the current study was conducted in Saudi Arabia by collecting the primary data using online questionnaire from a convenience sample size of 297 actual users of contactless payment methods.

Findings

Based on structural equation modeling, personalization and privacy invasion were approved to significantly impact perceived value of information disclosure (PVD). Strong causal associations were confirmed between perceived severity, structural assurance and response cost with privacy invasion. Finally, both PVD and privacy invasion significantly predict CIN.

Research limitations/implications

There are other important factors (i.e. technology interactivity, technology readiness, social influence, trust, prior experience, etc.) were not tested in the current study. Therefore, future studies would pay more attention regarding the impact of these factors. The current study data were also collected using a convenience sample of actual users of contactless payment methods. Therefore, there is a concern regarding the generalizability of the current study results to other kind of customers who have not used contactless payment.

Originality/value

This study has integrated both personalization–privacy paradox and protection motivation theory in one model. The current study holds value in providing a new and complete picture of the inhibitors and enablers of customers’ CIN to use contactless payment, including new types of inhibitors. Furthermore, personalization–privacy paradox has not been fully examined over the related area of Fintech and contactless payment in general. Therefore, this study was able to extend the theoretical horizon personalization–privacy paradox to new area (i.e. contactless payment) and new cultural context (Saudi Arabia).

Details

International Journal of Bank Marketing, vol. 42 no. 1
Type: Research Article
ISSN: 0265-2323

Keywords

Article
Publication date: 23 January 2024

Shreya Sangal, Gaurav Duggal and Achint Nigam

The purpose of this research paper is to review and synthesize the role of blockchain technology (BCT) in various types of illegal activities, including but not limited to fraud…

Abstract

Purpose

The purpose of this research paper is to review and synthesize the role of blockchain technology (BCT) in various types of illegal activities, including but not limited to fraud, money laundering, ransomware attacks, firearms, drug tracking, cyberattacks, identity theft and scams.

Design/methodology/approach

The authors conducted a review of studies related to illegal activities using blockchain from 2015 to 2023. Next, a thematic review of the literature was performed to see how these illegal activities were conducted using BCT.

Findings

Through this study, the authors identify the relevant themes that highlight the major illegal activities performed using BCT, its possible steps for prevention and the opportunities for future developments. Finally, the authors provide suggestions for future research using the theory, context and method framework.

Originality/value

No other research has synthesized the illegal activities using BCT through a thematic approach to the best of the authors’ knowledge. Hence, this study will act as a starting point for future research for academic and technical practitioners in this area.

Details

Journal of Information, Communication and Ethics in Society, vol. 22 no. 1
Type: Research Article
ISSN: 1477-996X

Keywords

Article
Publication date: 28 February 2023

Gautam Srivastava and Surajit Bag

Data-driven marketing is replacing conventional marketing strategies. The modern marketing strategy is based on insights derived from customer behavior information gathered from…

1433

Abstract

Purpose

Data-driven marketing is replacing conventional marketing strategies. The modern marketing strategy is based on insights derived from customer behavior information gathered from their facial expressions and neuro-signals. This study explores the potential for face recognition and neuro-marketing in modern-day marketing.

Design/methodology/approach

The study conducts an in-depth examination of the extant literature on neuro-marketing and facial recognition marketing. The articles for review are downloaded from the Scopus database, and PRISMA (Preferred Reporting Items for Systematic Reviews and Meta-Analyses) is then used to screen and choose the relevant papers. The systematic literature review method is applied to conduct the study.

Findings

An extensive review of the literature reveals that the domains of neuro-marketing and face recognition marketing remain understudied. The authors’ review of selected papers delivers five neuro-marketing and facial recognition marketing themes that are essential to modern marketing concepts.

Practical implications

Neuro-marketing and facial recognition marketing are artificial intelligence (AI)-enabled marketing techniques that assist in gaining cognitive insights into human behavior. The findings would be of use to managers in designing marketing strategies to enhance their marketing approach and boost conversion rates.

Originality/value

The uniqueness of this study lies in that it provides an updated review on neuro-marketing and face recognition marketing.

Details

Benchmarking: An International Journal, vol. 31 no. 2
Type: Research Article
ISSN: 1463-5771

Keywords

Book part
Publication date: 1 February 2024

Seden Doğan and İlayda Zeynep Niyet

Artificial Intelligence (AI) has revolutionised the tourism industry, offering personalised experiences and streamlining operations. AI provides customised recommendations for…

Abstract

Artificial Intelligence (AI) has revolutionised the tourism industry, offering personalised experiences and streamlining operations. AI provides customised recommendations for travellers through data analysis and machine learning, making their journeys more meaningful. It has also improved efficiency through automated processes, chatbots and enhanced security measures. AI's ability to analyse large volumes of data enables tourism organisations to make data-driven decisions and target their marketing strategies effectively. One of the most notable contributions of AI in tourism is its ability to offer personalised recommendations. By analysing vast travel history, preferences and online behaviour, AI systems can provide tailored suggestions for destinations, accommodations, activities and dining options. This level of customisation enhances the overall travel experience, making it more relevant and satisfying for individual travellers. AI has also greatly improved operational efficiency within the tourism sector. Chatbots, powered by natural language processing, are increasingly being deployed by hotels, airlines and travel agencies to provide instant customer support and assistance. These chatbots can answer queries, offer recommendations and handle booking processes, reducing waiting times and enhancing customer satisfaction. In addition, facial recognition technology allows for quick and accurate identity verification at airports, hotels and other travel-related facilities. This improves security and provides travellers with a seamless and efficient experience. As technology advances, we expect AI to play a more prominent role in augmented reality, voice recognition and virtual assistants, further enhancing the travel experience and facilitating seamless interactions. In conclusion, AI has transformed the tourism industry by providing personalised recommendations, improving operational efficiency, enhancing security measures and enabling data-driven destination management.

Open Access
Article
Publication date: 31 July 2020

Ado Adamou Abba Ari, Olga Kengni Ngangmo, Chafiq Titouna, Ousmane Thiare, Kolyang, Alidou Mohamadou and Abdelhak Mourad Gueroui

The Cloud of Things (IoT) that refers to the integration of the Cloud Computing (CC) and the Internet of Things (IoT), has dramatically changed the way treatments are done in the…

5876

Abstract

The Cloud of Things (IoT) that refers to the integration of the Cloud Computing (CC) and the Internet of Things (IoT), has dramatically changed the way treatments are done in the ubiquitous computing world. This integration has become imperative because the important amount of data generated by IoT devices needs the CC as a storage and processing infrastructure. Unfortunately, security issues in CoT remain more critical since users and IoT devices continue to share computing as well as networking resources remotely. Moreover, preserving data privacy in such an environment is also a critical concern. Therefore, the CoT is continuously growing up security and privacy issues. This paper focused on security and privacy considerations by analyzing some potential challenges and risks that need to be resolved. To achieve that, the CoT architecture and existing applications have been investigated. Furthermore, a number of security as well as privacy concerns and issues as well as open challenges, are discussed in this work.

Details

Applied Computing and Informatics, vol. 20 no. 1/2
Type: Research Article
ISSN: 2634-1964

Keywords

Abstract

Details

Technology vs. Government: The Irresistible Force Meets the Immovable Object
Type: Book
ISBN: 978-1-83867-951-4

1 – 10 of 26