Search results

1 – 10 of 251
Open Access
Article
Publication date: 18 January 2022

Srinimalan Balakrishnan Selvakumaran and Daniel Mark Hall

The purpose of this paper is to investigate the feasibility of an end-to-end simplified and automated reconstruction pipeline for digital building assets using the design science…

1463

Abstract

Purpose

The purpose of this paper is to investigate the feasibility of an end-to-end simplified and automated reconstruction pipeline for digital building assets using the design science research approach. Current methods to create digital assets by capturing the state of existing buildings can provide high accuracy but are time-consuming, expensive and difficult.

Design/methodology/approach

Using design science research, this research identifies the need for a crowdsourced and cloud-based approach to reconstruct digital building assets. The research then develops and tests a fully functional smartphone application prototype. The proposed end-to-end smartphone workflow begins with data capture and ends with user applications.

Findings

The resulting implementation can achieve a realistic three-dimensional (3D) model characterized by different typologies, minimal trade-off in accuracy and low processing costs. By crowdsourcing the images, the proposed approach can reduce costs for asset reconstruction by an estimated 93% compared to manual modeling and 80% compared to locally processed reconstruction algorithms.

Practical implications

The resulting implementation achieves “good enough” reconstruction of as-is 3D models with minimal tradeoffs in accuracy compared to automated approaches and 15× cost savings compared to a manual approach. Potential facility management use cases include the issue and information tracking, 3D mark-up and multi-model configurators.

Originality/value

Through user engagement, development, testing and validation, this work demonstrates the feasibility and impact of a novel crowdsourced and cloud-based approach for the reconstruction of digital building assets.

Details

Journal of Facilities Management , vol. 20 no. 3
Type: Research Article
ISSN: 1472-5967

Keywords

Open Access
Book part
Publication date: 9 May 2023

Volker Stocker, William Lehr and Georgios Smaragdakis

The COVID-19 pandemic has disrupted the ‘real’ world and substantially impacted the virtual world and thus the Internet ecosystem. It has caused a significant exogenous shock that…

Abstract

The COVID-19 pandemic has disrupted the ‘real’ world and substantially impacted the virtual world and thus the Internet ecosystem. It has caused a significant exogenous shock that offers a wealth of natural experiments and produced new data about broadband, clouds, and the Internet in times of crisis. In this chapter, we characterise and evaluate the evolving impact of the global COVID-19 crisis on traffic patterns and loads and the impact of those on Internet performance from multiple perspectives. While we place a particular focus on deriving insights into how we can better respond to crises and better plan for the post-COVID-19 ‘new normal’, we analyse the impact on and the responses by different actors of the Internet ecosystem across different jurisdictions. With a focus on the USA and Europe, we examine the responses of both public and private actors, with the latter including content and cloud providers, content delivery networks, and Internet service providers (ISPs). This chapter makes two contributions: first, we derive lessons learned for a future post-COVID-19 world to inform non-networking spheres and policy-making; second, the insights gained assist the networking community in better planning for the future.

Details

Beyond the Pandemic? Exploring the Impact of COVID-19 on Telecommunications and the Internet
Type: Book
ISBN: 978-1-80262-050-4

Keywords

Open Access
Article
Publication date: 23 March 2020

Hedaia-t-Allah Nabil Abd Al Ghaffar

The purpose of this paper is to try to reach the main factors that could put national security at risk as a result of government cloud computing programs.

7113

Abstract

Purpose

The purpose of this paper is to try to reach the main factors that could put national security at risk as a result of government cloud computing programs.

Design/methodology/approach

The paper adopts the analytical approach to first lay foundations of the relation between national security, cybersecurity and cloud computing, then it moves to analyze the main vulnerabilities that could affect national security in cases of government cloud computing usage.

Findings

The paper reached several findings such as the relation between cybersecurity and national security as well as a group of factors that may affect national security when governments shift to cloud computing mainly pertaining to storing data over the internet, the involvement of a third party, the lack of clear regulatory frameworks inside and between countries.

Practical implications

Governments are continuously working on developing their digital capacities to meet citizens’ demands. One of the most trending technologies adopted by governments is “cloud computing”, because of the tremendous advantages that the technology provides; such as huge cost-cutting, huge storage and computing capabilities. However, shifting to cloud computing raises a lot of security concerns.

Originality/value

The value of the paper resides in the novelty of the topic, which is a new contribution to the theoretical literature on relations between new technologies and national security. It is empirically important as well to help governments stay safe while enjoying the advantages of cloud computing.

Details

Review of Economics and Political Science, vol. 9 no. 2
Type: Research Article
ISSN: 2356-9980

Keywords

Open Access
Article
Publication date: 18 April 2023

Patience Mpofu, Solomon Hopewell Kembo, Marlvern Chimbwanda, Saulo Jacques, Nevil Chitiyo and Kudakwashe Zvarevashe

In response to food supply constraints resulting from coronavirus disease 2019 (COVID-19) restrictions, in the year 2020, the project developed automated household Aquaponics…

Abstract

Purpose

In response to food supply constraints resulting from coronavirus disease 2019 (COVID-19) restrictions, in the year 2020, the project developed automated household Aquaponics units to guarantee food self-sufficiency. However, the automated aquaponics solution did not fully comply with data privacy and portability best practices to protect the data of household owners. The purpose of this study is to develop a data privacy and portability layer on top of the previously developed automated Aquaponics units.

Design/methodology/approach

Design Science Research (DSR) is the research method implemented in this study.

Findings

General Data Protection and Privacy Regulations (GDPR)-inspired principles empowering data subjects including data minimisation, purpose limitation, storage limitation as well as integrity and confidentiality can be implemented in a federated learning (FL) architecture using Pinecone Matrix home servers and edge devices.

Research limitations/implications

The literature reviewed for this study demonstrates that the GDPR right to data portability can have a positive impact on data protection by giving individuals more control over their own data. This is achieved by allowing data subjects to obtain their personal information from a data controller in a format that makes it simple to reuse it in another context and to transmit this information freely to any other data controller of their choice. Data portability is not strictly governed or enforced by data protection laws in the developing world, such as Zimbabwe's Data Protection Act of 2021.

Practical implications

Privacy requirements can be implemented in end-point technology such as smartphones, microcontrollers and single board computer clusters enabling data subjects to be incentivised whilst unlocking the value of their own data in the process fostering competition among data controllers and processors.

Originality/value

The use of end-to-end encryption with Matrix Pinecone on edge endpoints and fog servers, as well as the practical implementation of data portability, are currently not adequately covered in the literature. The study acts as a springboard for a future conversation on the topic.

Details

International Journal of Industrial Engineering and Operations Management, vol. 5 no. 2
Type: Research Article
ISSN: 2690-6090

Keywords

Open Access
Article
Publication date: 4 August 2020

Samantha Fritz, Ian Milligan, Nick Ruest and Jimmy Lin

This paper aims to use the experience of an in-person event that was forced to go virtual in the wake of COVID-19 as an entryway into a discussion on the broader implications…

4414

Abstract

Purpose

This paper aims to use the experience of an in-person event that was forced to go virtual in the wake of COVID-19 as an entryway into a discussion on the broader implications around transitioning events online. It gives both practical recommendation to event organizers as well as broader reflections on the role of digital libraries during the COVID-19 pandemic and beyond.

Design/methodology/approach

The authors draw on their personal experiences with the datathon, as well as a comprehensive review of literature. The authors provide a candid assessment of what approaches worked and which ones did not.

Findings

A series of best practices are provided, including factors for assessing whether an event can be run online; the mixture of synchronous versus asynchronous content; and important technical questions around delivery. Focusing on a detailed case study of the shift of the physical team-building exercise, the authors note how cloud-based platforms were able to successfully assemble teams and jumpstart online collaboration. The existing decision to use cloud-based infrastructure facilitated the event’s transition as well. The authors use these examples to provide some broader insights on meaningful content delivery during the COVID-19 pandemic.

Originality/value

Moving an event online during a novel pandemic is part of a broader shift within the digital libraries’ community. This paper thus provides a useful professional resource for others exploring this shift, as well as those exploring new program delivery in the post-pandemic period (both due to an emphasis on climate reduction as well as reduced travel budgets in a potential period of financial austerity).

Details

Digital Library Perspectives, vol. 36 no. 4
Type: Research Article
ISSN: 2059-5816

Keywords

Open Access
Article
Publication date: 25 August 2021

Ana Faizi, Ali Padyab and Andreas Naess

This study aims to address the issue of practicing information security risk assessment (ISRA) on cloud solutions by studying municipalities and large organizations in Sweden.

1825

Abstract

Purpose

This study aims to address the issue of practicing information security risk assessment (ISRA) on cloud solutions by studying municipalities and large organizations in Sweden.

Design/methodology/approach

Four large organizations and five municipalities that use cloud services and conduct ISRA to adhere to their information security risk management practices were studied. Data were gathered qualitatively to answer the study’s research question: How is ISRA practiced on the cloud? The Coat Hanger model was used as a theoretical lens to study and theorize the practices.

Findings

The results showed that the organizations aimed to follow the guidelines, in the form of frameworks or their own experience, to conduct ISRA; furthermore, the frameworks were altered to fit the organizations’ needs. The results further indicated that one of the main concerns with the cloud ISRA was the absence of a culture that integrates risk management. Finally, the findings also stressed the importance of a good understanding and a well-written legal contract between the cloud providers and the organizations using the cloud services.

Originality/value

As opposed to the previous research, which was more inclined to try out and evaluate various cloud ISRA, the study provides insights into the practice of cloud ISRA experienced by the organizations. This study represents the first attempt to investigate cloud ISRA that organizations practice in managing their information security.

Details

Information & Computer Security, vol. 30 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

Open Access
Article
Publication date: 11 September 2017

Michel van Eeten

The issue of cybersecurity has been cast as the focal point of a fight between two conflicting governance models: the nation-state model of national security and the global…

5195

Abstract

Purpose

The issue of cybersecurity has been cast as the focal point of a fight between two conflicting governance models: the nation-state model of national security and the global governance model of multi-stakeholder collaboration, as seen in forums like IGF, IETF, ICANN, etc. There is a strange disconnect, however, between this supposed fight and the actual control over cybersecurity “on the ground”. This paper aims to reconnect discourse and control via a property rights approach, where control is located first and foremost in ownership.

Design/methodology/approach

This paper first conceptualizes current governance mechanisms through ownership and property rights. These concepts locate control over internet resources. They also help us understand ongoing shifts in control. Such shifts in governance are actually happening, security governance is being patched left and right, but these arrangements bear little resemblance to either the national security model of states or the global model of multi-stakeholder collaboration. With the conceptualization in hand, the paper then presents case studies of governance that have emerged around specific security externalities.

Findings

While not all mechanisms are equally effective, in each of the studied areas, the author found evidence of private actors partially internalizing the externalities, mostly on a voluntary basis and through network governance mechanisms. No one thinks that this is enough, but it is a starting point. Future research is needed to identify how these mechanisms can be extended or supplemented to further improve the governance of cybersecurity.

Originality/value

This paper bridges together the disconnected research communities on governance and (technical) cybersecurity.

Details

Digital Policy, Regulation and Governance, vol. 19 no. 6
Type: Research Article
ISSN: 2398-5038

Keywords

Open Access
Article
Publication date: 23 March 2022

Qi Ji, Yuanming Zhang, Gang Xiao, Hongfang Zhou and Zheng Lin

Data service (DS) is a special software service that enables data access in cloud environment and provides a unified data model for cross-origination data integration and data…

358

Abstract

Purpose

Data service (DS) is a special software service that enables data access in cloud environment and provides a unified data model for cross-origination data integration and data sharing. The purpose of the work is to automatically compose DSs and quickly generate data view to satisfy users' various data requirements (DRs).

Design/methodology/approach

The paper proposes an automatic DS composition and view generation approach. DSs are organized into DS dependence graph (DSDG) based on their inherent dependences, and DSs can be automatically composed using the DSDG according to user's DRs. Then, data view will be generated by interpreting the composed DS.

Findings

Experimental results with real cross-origination data sets show the proposed approaches have high efficiency and good quality for DS composition and view generation.

Originality/value

The authors propose a DS composition algorithm and a data view generation algorithm according to users' DRs.

Details

Journal of Intelligent Manufacturing and Special Equipment, vol. 3 no. 1
Type: Research Article
ISSN: 2633-6596

Keywords

Open Access
Article
Publication date: 5 September 2023

Heini Utunen, Ranil Appuhamy, Melissa Attias, Ngouille Ndiaye, Richelle George, Elham Arabi and Anna Tokar

OpenWHO is the World Health Organization's online learning platform that was launched in 2017. The COVID-19 pandemic led to massive growth in the number of courses, enrolments and…

Abstract

Purpose

OpenWHO is the World Health Organization's online learning platform that was launched in 2017. The COVID-19 pandemic led to massive growth in the number of courses, enrolments and reach of the platform. The platform is built on a stable and scalable basis that can host a large volume of learners. The authors aim to identify key factors that led to this growth.

Design/methodology/approach

In this research paper, the authors examined OpenWHO metadata, end-of-course surveys and internal processes using a quantitative approach.

Findings

OpenWHO metadata showed that the platform has hosted over 190 health courses in 65 languages and over seven million course enrolments. Since the onset of the pandemic, there have been more women, older people and people from middle income countries accessing courses than before. Following data analysis of the platform metadata and course production process, it was found that several key factors contributed to the growth of the platform. First, OpenWHO has a standardised course production pathway that ensures efficiency, consistency and quality. Further, providing courses in different languages increased its reach to a variety of populations throughout the world. For this, multi-language translation is achieved through a network of translators and an automated system to ensure the efficient translation of learning products. Lastly, it was found that access was promoted for learners with disabilities by optimising accessibility in course production. Data analysis of learner feedback surveys for selected courses showed that the courses were well received in that learners found it useful to complete courses that were self-paced and flexible. In addition, results indicated that preferred learning methods included videos, downloadable documents, slides, quizzes and learning exercises.

Originality/value

Lessons learnt from the WHO's learning response will help prepare researchers for the next health emergency to ensure timely, equitable access to quality health knowledge for everyone. Findings of this study will provide valuable insights for educators, policymakers and researchers in the field who intend to use online learning to optimise knowledge acquisition and performance.

Details

The International Journal of Information and Learning Technology, vol. 40 no. 5
Type: Research Article
ISSN: 2056-4880

Keywords

Open Access
Article
Publication date: 9 March 2022

Arun Aryal and Shilpa Balan

In the wake of the pandemic (COVID-19) throughout the United States, many educators had to promptly switch to online modality to continue to provide education to students with…

1489

Abstract

Purpose

In the wake of the pandemic (COVID-19) throughout the United States, many educators had to promptly switch to online modality to continue to provide education to students with safety through physical distancing requirements. This study mainly focuses on delivering an Information Systems module aligned with the information systems curriculum model during a pandemic.

Design/methodology/approach

The authors used data collection techniques from student assignments and course tasks. These data are used for the purpose of academic assessment for the Information Systems program. The student performance is assessed on a 5-point scale (1 being low and 5 being high) for the synchronous and the asynchronous tasks related to the course. The authors compared the student performance during the pandemic to the pre-pandemic semester.

Findings

This study revealed that the technical module of an information systems course can be successfully delivered during a pandemic in a remote session. However, the authors found that there is a decline in the student performance in synchronous tasks and asynchronous tasks. But the decline of the student performance in the synchronous tasks is greater than that of the asynchronous tasks. The result of this study helps the Information Systems program with their assessment and to improve their course delivery during a pandemic.

Originality/value

In this paper, the authors examine the delivery of a technical module in the field of information systems via online learning models. The authors particularly examine the synchronous and asynchronous online learning models in the delivery of the technical module. The lessons learned from transitioning to the online modality can help universities better prepare for the future during unprecedented times.

Details

Journal of Research in Innovative Teaching & Learning, vol. 16 no. 1
Type: Research Article
ISSN: 2397-7604

Keywords

1 – 10 of 251