Search results

1 – 10 of 157
Article
Publication date: 22 December 2022

Reihaneh Alsadat Tabaeeian, Behzad Hajrahimi and Atefeh Khoshfetrat

The purpose of this review paper was identifying barriers to the use of telemedicine systems in primary health-care individual level among professionals.

Abstract

Purpose

The purpose of this review paper was identifying barriers to the use of telemedicine systems in primary health-care individual level among professionals.

Design/methodology/approach

This study used Scopus and PubMed databases for scientific records identification. A systematic review of the literature structured by PRISMA guidelines was conducted on 37 included papers published between 2009 and 2019. A qualitative approach was used to synthesize insights into using telemedicine by primary care professionals.

Findings

Three barriers were identified and classified: system quality, data quality and service quality barriers. System complexity in terms of usability, system unreliability, security and privacy concerns, lack of integration and inflexibility of systems-in-use are related to system quality. Data quality barriers are data inaccuracy, data timeliness issues, data conciseness concerns and lack of data uniqueness. Finally, service reliability concerns, lack of technical support and lack of user training have been categorized as service quality barriers.

Originality/value

This review identified and mapped emerging themes of barriers to the use of telemedicine systems. This paper also through a new conceptualization of telemedicine use from perspectives of the primary care professionals contributes to informatics literature and system usage practices.

Details

Journal of Science and Technology Policy Management, vol. 15 no. 3
Type: Research Article
ISSN: 2053-4620

Keywords

Article
Publication date: 1 November 2023

Herbert Mattord, Kathleen Kotwica, Michael Whitman and Evan Battaglia

The purpose of this paper is to explore the current practices in security convergence among and between corporate security and cybersecurity processes in commercial enterprises.

Abstract

Purpose

The purpose of this paper is to explore the current practices in security convergence among and between corporate security and cybersecurity processes in commercial enterprises.

Design/methodology/approach

This paper is the first phase in a planned multiphase project to better understand current practices in security optimization efforts being implemented by commercial organizations exploring means and methods to operate securely while reducing operating costs. The research questions being examined are: What are the general levels of interest in cybersecurity and corporate security convergence? How well do the perspectives on convergence align between organizations? To what extent are organizations pursuing convergence? and How are organizations achieving the anticipated outcomes from convergence?

Findings

In organizations, the evolution to a more optimized security structure, either merged or partnered, was traditionally due to unplanned or unforeseen events; e.g. a spin-off/acquisition, new security leadership or a negative security incident was the initiator. This is in contrast to a proactive management decision or formal plan to change or enhance the security structure for reasons that include reducing costs of operations and/or improving outcomes to reduce operational risks. The dominant exception was in response to regulatory requirements. Preliminary findings suggest that outcomes from converged organizations are not necessarily more optimized in situations that are organizationally merged under a single leader. Optimization may ultimately depend on the strength of relationships and openness to collaboration between management, cybersecurity and corporate security personnel.

Research limitations/implications

This report and the number of respondents to its survey do not support generalizable findings. There are too few in each category to make reliable predictions and in analysis, there was an insufficient quantity of responses in most categories to allow supportable conclusions to be drawn.

Practical implications

Practitioners may find useful contextual clues to their needs for convergence or in response to directives for convergence from this report on what is found in some other organizations.

Social implications

Improved effectiveness and/or reduced costs for organizational cybersecurity would be a useful social outcome as organizations become more efficient in the face of increasing levels of cyber security threats.

Originality/value

Convergence as a concept has been around for some time now in both the practice and research communities. It was initially promoted formally by ASIS International and ISACA in 2005. Yet there is no universally agreed-upon definition for the term or the practices undertaken to achieve it. In addition, the business drivers and practices undertaken to achieve it are still not fully understood. If convergence or optimization of converged operations offers a superior operational construct compared to other structures, it is incumbent to discover if there are measurable benefits. This research hopes to define the concept of security collaboration optimization more fully. The eventual goal is to develop and promote a tool useful for organizations to measure where they are on such a continuum.

Details

Information & Computer Security, vol. 32 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 23 April 2024

Lu Zhang, Pu Dong, Long Zhang, Bojiao Mu and Ahui Yang

This study aims to explore the dissemination and evolutionary path of online public opinion from a crisis management perspective. By clarifying the influencing factors and dynamic…

Abstract

Purpose

This study aims to explore the dissemination and evolutionary path of online public opinion from a crisis management perspective. By clarifying the influencing factors and dynamic mechanisms of online public opinion dissemination, this study provides insights into attenuating the negative impact of online public opinion and creating a favorable ecological space for online public opinion.

Design/methodology/approach

This research employs bibliometric analysis and CiteSpace software to analyze 302 Chinese articles published from 2006 to 2023 in the China National Knowledge Infrastructure (CNKI) database and 276 English articles published from 1994 to 2023 in the Web of Science core set database. Through literature keyword clustering, co-citation analysis and burst terms analysis, this paper summarizes the core scientific research institutions, scholars, hot topics and evolutionary paths of online public opinion crisis management research from both Chinese and international academic communities.

Findings

The results show that the study of online public opinion crisis management in China and internationally is centered on the life cycle theory, which integrates knowledge from information, computer and system sciences. Although there are differences in political interaction and stage evolution, the overall evolutionary path is similar, and it develops dynamically in the “benign conflict” between the expansion of the research perspective and the gradual refinement of research granularity.

Originality/value

This study summarizes the research results of online public opinion crisis management from China and the international academic community and identifies current research hotspots and theoretical evolution paths. Future research can focus on deepening the basic theories of public opinion crisis management under the influence of frontier technologies, exploring the subjectivity and emotionality of web users using fine algorithms and promoting the international development of network public opinion crisis management theory through transnational comparison and international cooperation.

Details

Kybernetes, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0368-492X

Keywords

Open Access
Article
Publication date: 5 October 2023

Peter Dornheim and Ruediger Zarnekow

The human factor is the most important defense asset against cyberattacks. To ensure that the human factor stays strong, a cybersecurity culture must be established and cultivated…

1035

Abstract

Purpose

The human factor is the most important defense asset against cyberattacks. To ensure that the human factor stays strong, a cybersecurity culture must be established and cultivated in a company to guide the attitudes and behaviors of employees. Many cybersecurity culture frameworks exist; however, their practical application is difficult. This paper aims to demonstrate how an established framework can be applied to determine and improve the cybersecurity culture of a company.

Design/methodology/approach

Two surveys were conducted within eight months in the internal IT department of a global software company to analyze the cybersecurity culture and the applied improvement measures. Both surveys comprised the same 23 questions to measure cybersecurity culture according to six dimensions: cybersecurity accountability, cybersecurity commitment, cybersecurity necessity and importance, cybersecurity policy effectiveness, information usage perception and management buy-in.

Findings

Results demonstrate that cybersecurity culture maturity can be determined and improved if accurate measures are derived from the results of the survey. The first survey showed potential for improving the dimensions of cybersecurity accountability, cybersecurity commitment and cybersecurity policy effectiveness, while the second survey proved that these dimensions have been improved.

Originality/value

This paper proves that practical application of cybersecurity culture frameworks is possible if they are appropriately tailored to a given organization. In this regard, scientific research and practical application combine to offer real value to researchers and cybersecurity executives.

Details

Information & Computer Security, vol. 32 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 23 April 2024

Chen Zhong, Hong Liu and Hwee-Joo Kam

Cybersecurity competitions can effectively develop skills, but engaging a wide learner spectrum is challenging. This study aims to investigate the perceptions of cybersecurity…

Abstract

Purpose

Cybersecurity competitions can effectively develop skills, but engaging a wide learner spectrum is challenging. This study aims to investigate the perceptions of cybersecurity competitions among Reddit users. These users constitute a substantial demographic of young individuals, often participating in communities oriented towards college students or cybersecurity enthusiasts. The authors specifically focus on novice learners who showed an interest in cybersecurity but have not participated in competitions. By understanding their views and concerns, the authors aim to devise strategies to encourage their continuous involvement in cybersecurity learning. The Reddit platform provides unique access to this significant demographic, contributing to enhancing and diversifying the cybersecurity workforce.

Design/methodology/approach

The authors propose to mine Reddit posts for information about learners’ attitudes, interests and experiences with cybersecurity competitions. To mine Reddit posts, the authors developed a text mining approach that integrates computational text mining and qualitative content analysis techniques, and the authors discussed the advantages of the integrated approach.

Findings

The authors' text mining approach was successful in extracting the major themes from the collected posts. The authors found that motivated learners would want to form a strategic way to facilitate their learning. In addition, hope and fear collide, which exposes the learners’ interests and challenges.

Originality/value

The authors discussed the findings to provide education and training experts with a thorough understanding of novice learners, allowing them to engage them in the cybersecurity industry.

Details

Information & Computer Security, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 14 March 2024

Bilge Nur Öztürk

The psychological foundations of consumers’ reasons for product choices are analyzed in the field of marketing. The purpose of this research is to identify the implicit reasons…

Abstract

Purpose

The psychological foundations of consumers’ reasons for product choices are analyzed in the field of marketing. The purpose of this research is to identify the implicit reasons for white meat consumption in the UK and Turkey.

Design/methodology/approach

In the scope of the means-end chain theory, in-depth interviews were conducted with individuals, and the reasons for consumers’ product preferences were revealed by moving from concrete to abstract.

Findings

It has been determined that the white meat consumption of Muslims in the UK is primarily shaped by their religious approach. In Turkey, on the contrary, both consumption patterns and reasons for preference are changing. It has been found that white meat consumption is associated with values such as security needs, satisfaction with life, self-fulfillment and happiness.

Research limitations/implications

This research has contributed to the marketing literature by examining consumers’ implicit consumption reasons for white meat in the context of religion and culture.

Practical implications

Marketing strategies should focus on building trust in halal certification, particularly in the UK. Brands should associate their promotion strategies with feelings of security and happiness, which are associated in the minds of consumers.

Originality/value

This study is a new study in terms of revealing the connotations of consumers about consuming chicken and fish and showing the implicit needs that the brands can emotionally associate with.

Details

Journal of Islamic Marketing, vol. 15 no. 5
Type: Research Article
ISSN: 1759-0833

Keywords

Article
Publication date: 28 February 2023

Sara Rashidian, Robin Drogemuller, Sara Omrani and Fereshteh Banakar

The application of integrated project delivery (IPD) in conjunction with building information modeling (BIM) and Lean Construction (LC) as the efficient method for improving…

Abstract

Purpose

The application of integrated project delivery (IPD) in conjunction with building information modeling (BIM) and Lean Construction (LC) as the efficient method for improving collaboration and delivering construction projects has been acknowledged by construction academics and professionals. Once organizations have fully embraced BIM, IPD and LC integration, a measurement tool such as a maturity model (MM) for benchmarking their progress and setting realistic goals for continuous improvement will be required. In the context of MMs literature, however, no comprehensive analysis of these three construction management methods has been published to reveal the current trends and common themes in which the models have approached each other.

Design/methodology/approach

Therefore, this study integrates systematic literature review (SLR) and thematic analysis techniques to review and categorize the related MMs; the key themes in which the interrelationship between BIM, IPD and LC MMs has been discussed and conceptualized in the attributes; the shared characteristics of the existing BIM, IPD and LC MMs, as well as their strengths and limitations. The Preferred Reporting Items for Systematic Reviews (PRISMA) method has been used as the primary procedure for article screening and reviewing published papers between 2007 and 2022.

Findings

Despite the growth of BIM, IPD and LC integration publications and acknowledgment in the literature, no MM has been established that holistically measures BIM, IPD and LC integration in an organization. This study identifies five interrelated and overlapping themes indicative of the collaboration of BIM, IPD and LC in existing MMs' structure, including customer satisfaction, waste minimization, Lean practices and cultural and legal aspects. Furthermore, the MMs' common characteristics, strengths and limitations are evaluated to provide a foundation for developing future BIM, IPD and LC-related MMs.

Practical implications

This paper examines the current status of research and the knowledge gaps around BIM, IPD and LC MMs. In addition, the highlighted major themes serve as a foundation for academics who intend to develop integrated BIM, IPD, and LC MMs. This will enable researchers to build upon these themes and establish a comprehensive list of maturity attributes fulfilling the BIM, IPD and LC requirements and principles. In addition, the MMs' BIM, IPD and LC compatibility themes, which go beyond themes' intended characteristics in silos, increase industry practitioners' awareness of the underlying factors of BIM, IPD and LC integration.

Originality/value

This review article is the first of a kind to analyze the interaction of IPD, BIM and LC in the context of MMs in current AEC literature. This study concludes that BIM, IPD and LC share several joint cornerstones according to the existing MMs.

Details

Smart and Sustainable Built Environment, vol. 13 no. 3
Type: Research Article
ISSN: 2046-6099

Keywords

Open Access
Article
Publication date: 29 February 2024

Rosemarie Santa González, Marilène Cherkesly, Teodor Gabriel Crainic and Marie-Eve Rancourt

This study aims to deepen the understanding of the challenges and implications entailed by deploying mobile clinics in conflict zones to reach populations affected by violence and…

Abstract

Purpose

This study aims to deepen the understanding of the challenges and implications entailed by deploying mobile clinics in conflict zones to reach populations affected by violence and cut off from health-care services.

Design/methodology/approach

This research combines an integrated literature review and an instrumental case study. The literature review comprises two targeted reviews to provide insights: one on conflict zones and one on mobile clinics. The case study describes the process and challenges faced throughout a mobile clinic deployment during and after the Iraq War. The data was gathered using mixed methods over a two-year period (2017–2018).

Findings

Armed conflicts directly impact the populations’ health and access to health care. Mobile clinic deployments are often used and recommended to provide health-care access to vulnerable populations cut off from health-care services. However, there is a dearth of peer-reviewed literature documenting decision support tools for mobile clinic deployments.

Originality/value

This study highlights the gaps in the literature and provides direction for future research to support the development of valuable insights and decision support tools for practitioners.

Details

Journal of Humanitarian Logistics and Supply Chain Management, vol. 14 no. 2
Type: Research Article
ISSN: 2042-6747

Keywords

Article
Publication date: 26 January 2023

Afiqah R. Radzi, Nur Farhana Azmi, Syahrul Nizam Kamaruzzaman, Rahimi A. Rahman and Eleni Papadonikolaki

Digital twin (DT) and building information modeling (BIM) are interconnected in some ways. However, there has been some misconception about how DT differs from BIM. As a result…

Abstract

Purpose

Digital twin (DT) and building information modeling (BIM) are interconnected in some ways. However, there has been some misconception about how DT differs from BIM. As a result, industry professionals reject DT even in BIM-based construction projects due to reluctance to innovate. Furthermore, researchers have repeatedly developed tools and techniques with the same goals using DT and BIM to assist practitioners in construction projects. Therefore, this study aims to assist industry professionals and researchers in understanding the relationship between DT and BIM and synthesize existing works on DT and BIM.

Design/methodology/approach

A systematic review was conducted on published articles related to DT and BIM. A total record of 54 journal articles were identified and analyzed.

Findings

The analysis of the selected journal articles revealed four types of relationships between DT and BIM: BIM is a subset of DT, DT is a subset of BIM, BIM is DT, and no relationship between BIM and DT. The existing research on DT and BIM in construction projects targets improvements in five areas: planning, design, construction, operations and maintenance, and decommissioning. In addition, several areas have emerged, such as developing geo-referencing approaches for infrastructure projects, applying the proposed methodology to other construction geometries and creating 3D visualization using color schemes.

Originality/value

This study contributed to the existing body of knowledge by overviewing existing research related to DT and BIM in construction projects. Also, it reveals research gaps in the body of knowledge to point out directions for future research.

Details

Construction Innovation , vol. 24 no. 3
Type: Research Article
ISSN: 1471-4175

Keywords

Abstract

Details

International Trade and Inclusive Economic Growth
Type: Book
ISBN: 978-1-83753-471-5

1 – 10 of 157