Search results

1 – 10 of 48
Open Access
Article
Publication date: 9 April 2018

Steve Moore

The purpose of this paper is to present findings from face-to-face interviews undertaken with 16 care and nursing home managers employed in homes situated in two English local…

1787

Abstract

Purpose

The purpose of this paper is to present findings from face-to-face interviews undertaken with 16 care and nursing home managers employed in homes situated in two English local authorities. The research sought to explore managers’ perceptions of the role of contract monitoring in the prevention of abuse.

Design/methodology/approach

Semi-structured interviews were undertaken with 16 care and nursing home managers.

Findings

Though personnel employed by the local authority who conducted contract monitoring were generally thought of positively by care home managers on a personal level, their effectiveness was perceived to be limited as a result of their lack of experience and knowledge of providing care, and the methods that they were required to use.

Research limitations/implications

Though the research draws upon the experiences of only 16 care and nursing home managers in two local authorities, data suggest that current contract monitoring activity is of limited utility in determining the true nature of care and the presence of abuse.

Originality/value

Unusually, the paper explores care and nursing home managers’ perceptions of contract monitoring processes in terms of how they perceive their effectiveness in preventing abuse.

Open Access
Article
Publication date: 30 September 2021

Kittisak Makkawan and Thanyaphat Muangpan

Autonomous ports and digital ports are a modern trend of global commercial ports that are established to develop toward smart ports in many ports. Smart port indicators (SPIs) are…

1209

Abstract

Autonomous ports and digital ports are a modern trend of global commercial ports that are established to develop toward smart ports in many ports. Smart port indicators (SPIs) are used as important tools for measuring, encouraging, and indicating smart port performance. These are the main indicators to operate smart port management as the practical direction and port development planning are enclosed. This research aims to identify the SPIs and to develop a conceptual model of smart port performance in a case study of The Eastern Economic Corridor (EEC) in Thailand. Triangulation data are used in the data collection with three sources: the reviewed literature of five international databases in 2016–2021, participant observations, and in-depth interviews. Content analysis is utilized to analyze these data to develop a conceptual model approach. The findings of this research are shown in three main domains classified as smart port operation, smart port environment/energy, and smart port safety/security. These indicators represent 29 SPIs for developing smart port performance, which can be explained with a conceptual model. This information will exist as the foundation framework guiding Thai smart ports towards international standards of smart port efficiency.

Details

Journal of International Logistics and Trade, vol. 19 no. 3
Type: Research Article
ISSN: 1738-2122

Keywords

Open Access
Book part
Publication date: 9 December 2021

Abstract

Details

Ethical Issues in Covert, Security and Surveillance Research
Type: Book
ISBN: 978-1-80262-414-4

Open Access
Article
Publication date: 2 January 2024

Eylem Thron, Shamal Faily, Huseyin Dogan and Martin Freer

Railways are a well-known example of complex critical infrastructure, incorporating socio-technical systems with humans such as drivers, signallers, maintainers and passengers at…

Abstract

Purpose

Railways are a well-known example of complex critical infrastructure, incorporating socio-technical systems with humans such as drivers, signallers, maintainers and passengers at the core. The technological evolution including interconnectedness and new ways of interaction lead to new security and safety risks that can be realised, both in terms of human error, and malicious and non-malicious behaviour. This study aims to identify the human factors (HF) and cyber-security risks relating to the role of signallers on the railways and explores strategies for the improvement of “Digital Resilience” – for the concept of a resilient railway.

Design/methodology/approach

Overall, 26 interviews were conducted with 21 participants from industry and academia.

Findings

The results showed that due to increased automation, both cyber-related threats and human error can impact signallers’ day-to-day operations – directly or indirectly (e.g. workload and safety-critical communications) – which could disrupt the railway services and potentially lead to safety-related catastrophic consequences. This study identifies cyber-related problems, including external threats; engineers not considering the human element in designs when specifying security controls; lack of security awareness among the rail industry; training gaps; organisational issues; and many unknown “unknowns”.

Originality/value

The authors discuss socio-technical principles through a hexagonal socio-technical framework and training needs analysis to mitigate against cyber-security issues and identify the predictive training needs of the signallers. This is supported by a systematic approach which considers both, safety and security factors, rather than waiting to learn from a cyber-attack retrospectively.

Details

Information & Computer Security, vol. 32 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

Open Access
Book part
Publication date: 9 December 2021

Marina Da Bormida

Advances in Big Data, artificial Intelligence and data-driven innovation bring enormous benefits for the overall society and for different sectors. By contrast, their misuse can…

Abstract

Advances in Big Data, artificial Intelligence and data-driven innovation bring enormous benefits for the overall society and for different sectors. By contrast, their misuse can lead to data workflows bypassing the intent of privacy and data protection law, as well as of ethical mandates. It may be referred to as the ‘creep factor’ of Big Data, and needs to be tackled right away, especially considering that we are moving towards the ‘datafication’ of society, where devices to capture, collect, store and process data are becoming ever-cheaper and faster, whilst the computational power is continuously increasing. If using Big Data in truly anonymisable ways, within an ethically sound and societally focussed framework, is capable of acting as an enabler of sustainable development, using Big Data outside such a framework poses a number of threats, potential hurdles and multiple ethical challenges. Some examples are the impact on privacy caused by new surveillance tools and data gathering techniques, including also group privacy, high-tech profiling, automated decision making and discriminatory practices. In our society, everything can be given a score and critical life changing opportunities are increasingly determined by such scoring systems, often obtained through secret predictive algorithms applied to data to determine who has value. It is therefore essential to guarantee the fairness and accurateness of such scoring systems and that the decisions relying upon them are realised in a legal and ethical manner, avoiding the risk of stigmatisation capable of affecting individuals’ opportunities. Likewise, it is necessary to prevent the so-called ‘social cooling’. This represents the long-term negative side effects of the data-driven innovation, in particular of such scoring systems and of the reputation economy. It is reflected in terms, for instance, of self-censorship, risk-aversion and lack of exercise of free speech generated by increasingly intrusive Big Data practices lacking an ethical foundation. Another key ethics dimension pertains to human-data interaction in Internet of Things (IoT) environments, which is increasing the volume of data collected, the speed of the process and the variety of data sources. It is urgent to further investigate aspects like the ‘ownership’ of data and other hurdles, especially considering that the regulatory landscape is developing at a much slower pace than IoT and the evolution of Big Data technologies. These are only some examples of the issues and consequences that Big Data raise, which require adequate measures in response to the ‘data trust deficit’, moving not towards the prohibition of the collection of data but rather towards the identification and prohibition of their misuse and unfair behaviours and treatments, once government and companies have such data. At the same time, the debate should further investigate ‘data altruism’, deepening how the increasing amounts of data in our society can be concretely used for public good and the best implementation modalities.

Details

Ethical Issues in Covert, Security and Surveillance Research
Type: Book
ISBN: 978-1-80262-414-4

Keywords

Open Access
Article
Publication date: 8 December 2022

Jacobus Gerhardus J. Nortje

The purpose of this paper is to critically analyse the extent of protection available for whistleblowers in South African criminal cases.

3562

Abstract

Purpose

The purpose of this paper is to critically analyse the extent of protection available for whistleblowers in South African criminal cases.

Design/methodology/approach

This paper first provides a brief background of crime in South Africa and argues that the concept of the whistleblower is just a buss word or collective noun. The methodology of this paper consists of a literature review of whistleblowers and relevant laws that can be used to protect whistleblowers in South African criminal cases.

Findings

This paper concludes that the existing law as primarily contained in the Criminal Procedure Act 51 of 1977 provides appropriate protection for whistleblowers in South African criminal cases.

Research limitations/implications

Whistleblowers provide information on criminal, civil and disciplinary wrongdoings. This study focuses on the protection of whistleblowers pursuant to mainly the provisions of the Criminal Procedure Act 51 of 1977.

Originality/value

The originality of this paper lies in the approach to the handling of whistleblowers in South African criminal cases. This is the first research done with the emphasis on the use of mainly the provisions of the Criminal Procedure Act 51 of 1977 to protect whistleblowers in South African criminal cases. The contribution of the study is that, by using this approach, it can provide protection and save lives, and it may enhance the willingness of whistleblowers to blow the whistle, which will be beneficial to the community of South Africa as a whole.

Details

Journal of Financial Crime, vol. 30 no. 6
Type: Research Article
ISSN: 1359-0790

Keywords

Open Access
Article
Publication date: 24 November 2023

Ornella Tanga Tambwe, Clinton Ohis Aigbavboa and Opeoluwa Akinradewo

Data represents a critical resource that enables construction companies’ success; thus, its management is very important. The purpose of this study is to assess the benefits of…

Abstract

Purpose

Data represents a critical resource that enables construction companies’ success; thus, its management is very important. The purpose of this study is to assess the benefits of construction data risks management (DRM) in the construction industry (CI).

Design/methodology/approach

This study adopted a quantitative method and collected data from various South African construction professionals with the aid of an e-questionnaire. These professionals involve electrical engineers, quantity surveyors, architects and mechanical, as well as civil engineers involved under a firm, or organisation within the province of Gauteng, South Africa. Standard deviation, mean item score, non-parametric Kruskal–Wallis H test and exploratory factor analysis were used to analyse the retrieved data.

Findings

The findings revealed that DRM enhances project and company data availability, promotes confidentiality and enhances integrity, which are the primary benefits of DRM that enable the success of project delivery.

Research limitations/implications

The research was carried out only in the province of Gauteng due to COVID-19 travel limitations.

Practical implications

The construction companies will have their data permanently in their possession and no interruption will be seen due to data unavailability, which, in turn, will allow long-term and overall pleasant project outcomes.

Originality/value

This study seeks to address the benefits of DRM in the CI to give additional knowledge on risk management within the built environment to promote success in every project.

Details

Journal of Engineering, Design and Technology , vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1726-0531

Keywords

Open Access
Article
Publication date: 31 March 2023

Jonas Schwarz, Valentina Kascel, Muhammad Azmat and Sebastian Kummer

This study aims to compare the humanitarian supply chains and logistics of two countries in earthquake preparedness by modifying and using a previously established preparedness…

2150

Abstract

Purpose

This study aims to compare the humanitarian supply chains and logistics of two countries in earthquake preparedness by modifying and using a previously established preparedness evaluation framework.

Design/methodology/approach

A European flood emergency management system (FEMS) is a seven-dimensional framework to assess a country’s preparedness for flood emergencies. The FEMS framework was modified to apply to earthquakes. Leveraging a multiple explanatory case study approach with data analysis, the authors reconstructed the events of the earthquakes in Pakistan (2005) and Japan (2011) with an applied grading (1–5). Findings were evaluated within the adopted FEMS framework. From a practitioner’s perspective, the framework is applicable and can accelerate support in the field.

Findings

Pakistan lacked emergency plans before the 2005 earthquake. In contrast, Japan possessed emergency plans before the disaster, helping minimise casualties. Overall, Japan demonstrated considerably better emergency management effectiveness. However, both countries significantly lacked the distribution of responsibilities among actors.

Originality/value

Practical factors in the humanitarian supply chain are well understood. However, synthesising individual factors into a comprehensive framework is difficult, which the study solves by applying and adopting the FEMS framework to earthquakes. The developed framework allows practitioners a structured baseline for prioritising measures in the field. Furthermore, this study exemplifies the usefulness of cross-hazard research within emergency management and preparedness in a real-world scenario.

Details

Journal of Humanitarian Logistics and Supply Chain Management, vol. 13 no. 3
Type: Research Article
ISSN: 2042-6747

Keywords

Open Access
Article
Publication date: 3 March 2022

Mohamad Shaharudin Samsurijan, Andrew Ebekozien, Noor Alyani Nor Azazi, Maslina Mohammed Shaed and Radin Firdaus Radin Badaruddin

Studies showed that a proactive delivery system employing innovative artificial intelligence (AI) in urban services might perform better. This has become an important national…

7743

Abstract

Purpose

Studies showed that a proactive delivery system employing innovative artificial intelligence (AI) in urban services might perform better. This has become an important national policy for many countries. Thus, this study aims to explore the influence of AI in urban services in Malaysia.

Design/methodology/approach

Official documents such as Structure Plan and Government Transformation Programme Policy Document covering various levels of cities in Malaysia, articles related to urban studies mostly written by researchers regarding urban growth in Malaysia and the Urban Development Bulletin from the Federal Department of Town and Country Planning from 1957 to date were reviewed and analysed.

Findings

The findings show that the influence of AI in urban services has long existed and been carefully planned by local authorities since colonial times. The development of global digital technology influences the upgrading of AI in urban services in Malaysia. Also, the success of AI in these municipal services is influenced by the rate of information technology literacy among the urban population. These developments have led to the definition of a conceptual city.

Research limitations/implications

This paper's findings and conclusion were based on reviewed literature but did not compromise the strength of this paper. Thus, as part of the implications for future research, mixed-methods research design has been suggested.

Practical implications

As part of the implications, this article intends to promote AI in urban services in Malaysia and other developing countries with similar urban services challenges.

Originality/value

This paper encourages AI applications in urban services because it enhances service delivery performance. This intends to key stakeholders to promote AI via policies across Malaysia's urban services as part of the study implications.

Details

PSU Research Review, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2399-1747

Keywords

Open Access
Article
Publication date: 18 September 2019

Omid Maghazei and Torbjørn Netland

Although the industrial application of drones is increasing quickly, there is a scarcity of applications in manufacturing. The purpose of this paper is to explore current and…

20016

Abstract

Purpose

Although the industrial application of drones is increasing quickly, there is a scarcity of applications in manufacturing. The purpose of this paper is to explore current and potential applications of drones in manufacturing, examine the opportunities and challenges involved and propose a research agenda.

Design/methodology/approach

The paper reports the result of an extensive qualitative investigation into an emerging phenomenon. The authors build on the literature on advanced manufacturing technologies. Data collected through in-depth interviews with 66 drone experts from 56 drone vendors and related services are analyzed using an inductive research design.

Findings

Drones represent a promising AMT that is expected to be used in several applications in manufacturing in the next few years. This paper proposes a typology of drone applications in manufacturing, explains opportunities and challenges involved and develops a research agenda. The typology categorizes four types of applications based on the drones’ capabilities to “see,” “sense,” “move” and “transform.”

Research limitations/implications

The proposed research agenda offers a guide for future research on drones in manufacturing. There are many research opportunities in the domains of industrial engineering, technology development and behavioral operations.

Practical implications

Guidance on current and promising potentials of drones in manufacturing is provided to practitioners. Particularly interesting applications are those that help manufacturers “see” and “sense” data in their factories. Applications that “move” or “transform” objects are scarcer, and they make sense only in special cases in very large manufacturing facilities.

Originality/value

The application of drones in manufacturing is in its infancy, but is foreseen to grow rapidly over the next decade. This paper presents the first academically rigorous analysis of potential applications of drones in manufacturing. An original and theory-informed typology for drone applications is a timely contribution to the nascent literature. The research agenda presented assists the establishment of a new stream of literature on drones in manufacturing.

Details

Journal of Manufacturing Technology Management, vol. 31 no. 6
Type: Research Article
ISSN: 1741-038X

Keywords

Access

Only Open Access

Year

All dates (48)

Content type

1 – 10 of 48