Search results
1 – 10 of 70Mikias Gugssa, Long Li, Lina Pu, Ali Gurbuz, Yu Luo and Jun Wang
Computer vision and deep learning (DL) methods have been investigated for personal protective equipment (PPE) monitoring and detection for construction workers’ safety. However…
Abstract
Purpose
Computer vision and deep learning (DL) methods have been investigated for personal protective equipment (PPE) monitoring and detection for construction workers’ safety. However, it is still challenging to implement automated safety monitoring methods in near real time or in a time-efficient manner in real construction practices. Therefore, this study developed a novel solution to enhance the time efficiency to achieve near-real-time safety glove detection and meanwhile preserve data privacy.
Design/methodology/approach
The developed method comprises two primary components: (1) transfer learning methods to detect safety gloves and (2) edge computing to improve time efficiency and data privacy. To compare the developed edge computing-based method with the currently widely used cloud computing-based methods, a comprehensive comparative analysis was conducted from both the implementation and theory perspectives, providing insights into the developed approach’s performance.
Findings
Three DL models achieved mean average precision (mAP) scores ranging from 74.92% to 84.31% for safety glove detection. The other two methods by combining object detection and classification achieved mAP as 89.91% for hand detection and 100% for glove classification. From both implementation and theory perspectives, the edge computing-based method detected gloves faster than the cloud computing-based method. The edge computing-based method achieved a detection latency of 36%–68% shorter than the cloud computing-based method in the implementation perspective. The findings highlight edge computing’s potential for near-real-time detection with improved data privacy.
Originality/value
This study implemented and evaluated DL-based safety monitoring methods on different computing infrastructures to investigate their time efficiency. This study contributes to existing knowledge by demonstrating how edge computing can be used with DL models (without sacrificing their performance) to improve PPE-glove monitoring in a time-efficient manner as well as maintain data privacy.
Details
Keywords
Laila Dahabiyeh, Ali Farooq, Farhan Ahmad and Yousra Javed
During the past few years, social media has faced the challenge of maintaining its user base. Reports show that the social media giants such as Facebook and Twitter experienced a…
Abstract
Purpose
During the past few years, social media has faced the challenge of maintaining its user base. Reports show that the social media giants such as Facebook and Twitter experienced a decline in their users. Taking WhatsApp's recent change of its terms of use as the case of this study and using the push-pull-mooring model and a configurational perspective, this study aims to identify pathways for switching intentions.
Design/methodology/approach
Data were collected from 624 WhatsApp users recruited from Amazon Mechanical Turk and analyzed using fuzzy set qualitative comparative analysis (fsQCA).
Findings
The findings identify seven configurations for high switching intentions and four configurations for low intentions to switch. Firm reputation and critical mass increase intention to switch, while low firm reputation and absence of attractive alternatives hinder switching.
Research limitations/implications
This study extends extant literature on social media migration by identifying configurations that result in high and low switching intention among messaging applications.
Practical implications
The study identifies factors the technology service providers should consider to attract new users and retain existing users.
Originality/value
This study complements the extant literature on switching intention that explains the phenomenon based on a net-effect approach by offering an alternative view that focuses on the existence of multiple pathways to social media switching. It further advances the authors’ understanding of the relevant importance of switching factors.
Details
Keywords
Xingchen Zhou, Pei-Luen Patrick Rau and Zhuoni Jie
This study aims to reveal how mobile app stickiness is formed and how the stickiness formation process differs for apps of different social levels.
Abstract
Purpose
This study aims to reveal how mobile app stickiness is formed and how the stickiness formation process differs for apps of different social levels.
Design/methodology/approach
This study proposed and validated a stickiness formation model following the cognitive–affective–conative framework. Data were collected from surveys of 1,240 mobile app users and analyzed using structural equation modeling. Multigroup analysis was applied to contrast the stickiness formation process among apps of different social levels.
Findings
This study revealed a causal link between cognitive, affective and conative factors. It found partial mediation effects of trust in the association between perceptions and satisfaction, and the full mediation role of satisfaction and personal investment (PI) in the effects of subjective norm (SN) on stickiness. The multigroup analysis results suggested that social media affordances benefit stickiness through increased PI and strengthened effects of SN on PI. However, it damages stickiness through increased perceived privacy risk (PPR), decreased trust and strengthened effects of PPR on trust.
Originality/value
This study contributes to both stickiness scholars and practitioners, as it builds a model to understand the stickiness formation process and reveals the effects of the “go social” strategy. The novelty of this study is that it examined social influences, considered privacy issues and revealed two mediation mechanisms. The findings can guide the improvement of mobile app stickiness and the application of the “go social” strategy.
Details
Keywords
Marcos Dieste, Guido Orzes, Giovanna Culot, Marco Sartor and Guido Nassimbeni
A positive outlook on the impact of Industry 4.0 (I4.0) on sustainability prevails in the literature. However, some studies have highlighted potential areas of concern that have…
Abstract
Purpose
A positive outlook on the impact of Industry 4.0 (I4.0) on sustainability prevails in the literature. However, some studies have highlighted potential areas of concern that have not yet been systematically addressed. The goal of this study is to challenge the assumption of a sustainable Fourth Industrial Revolution by (1) identifying the possible unintended negative impacts of I4.0 technologies on sustainability; (2) highlighting the underlying motivations and potential actions to mitigate such impacts; and (3) developing and evaluating alternative assumptions on the impacts of I4.0 technologies on sustainability.
Design/methodology/approach
Building on a problematization approach, a systematic literature review was conducted to develop potential alternative assumptions about the negative impacts of I4.0 on sustainability. Then, a Delphi study was carried out with 43 experts from academia and practice to evaluate the alternative assumptions. Two rounds of data collection were performed until reaching the convergence or stability of the responses.
Findings
The results highlight various unintended negative effects on environmental and social aspects that challenge the literature. The reasons behind the high/low probability of occurrence, the severity of each impact in the next five years and corrective actions are also identified. Unintended negative environmental effects are less controversial than social effects and are therefore more likely to generate widely accepted theoretical propositions. Finally, the alternative hypothesis ground is partially accepted by the panel, indicating that the problematization process has effectively opened up new perspectives for analysis.
Originality/value
This study is one of the few to systematically problematize the assumptions of the I4.0 and sustainability literature, generating research propositions that reveal several avenues for future research.
Details
Keywords
This paper aims to review the latest management developments across the globe and pinpoint practical implications from cutting-edge research and case studies.
Abstract
Purpose
This paper aims to review the latest management developments across the globe and pinpoint practical implications from cutting-edge research and case studies.
Design/methodology/approach
This briefing is prepared by an independent writer who adds their own impartial comments and places the articles in context.
Findings
Cloud computing services provide firms with increased scope to grow and prosper. Successful adoption of cloud demands a focus on organizational learning and talent management to ensure that individuals, groups and units are equipped with relevant skills and capabilities needed to perform effectively in their roles as they evolve in the digital age.
Originality/value
The briefing saves busy executives and researchers hours of reading time by selecting only the very best, most pertinent information and presenting it in a condensed and easy-to-digest format.
Details
Keywords
Miguel Calvo and Marta Beltrán
This paper aims to propose a new method to derive custom dynamic cyber risk metrics based on the well-known Goal, Question, Metric (GQM) approach. A framework that complements it…
Abstract
Purpose
This paper aims to propose a new method to derive custom dynamic cyber risk metrics based on the well-known Goal, Question, Metric (GQM) approach. A framework that complements it and makes it much easier to use has been proposed too. Both, the method and the framework, have been validated within two challenging application domains: continuous risk assessment within a smart farm and risk-based adaptive security to reconfigure a Web application firewall.
Design/methodology/approach
The authors have identified a problem and provided motivation. They have developed their theory and engineered a new method and a framework to complement it. They have demonstrated the proposed method and framework work, validating them in two real use cases.
Findings
The GQM method, often applied within the software quality field, is a good basis for proposing a method to define new tailored cyber risk metrics that meet the requirements of current application domains. A comprehensive framework that formalises possible goals and questions translated to potential measurements can greatly facilitate the use of this method.
Originality/value
The proposed method enables the application of the GQM approach to cyber risk measurement. The proposed framework allows new cyber risk metrics to be inferred by choosing between suggested goals and questions and measuring the relevant elements of probability and impact. The authors’ approach demonstrates to be generic and flexible enough to allow very different organisations with heterogeneous requirements to derive tailored metrics useful for their particular risk management processes.
Details
Keywords
Chao Lu and Xiaohai Xin
The promotion of autonomous vehicles introduces privacy and security risks, underscoring the pressing need for responsible innovation implementation. To more effectively address…
Abstract
Purpose
The promotion of autonomous vehicles introduces privacy and security risks, underscoring the pressing need for responsible innovation implementation. To more effectively address the societal risks posed by autonomous vehicles, considering collaborative engagement of key stakeholders is essential. This study aims to provide insights into the governance of potential privacy and security issues in the innovation of autonomous driving technology by analyzing the micro-level decision-making processes of various stakeholders.
Design/methodology/approach
For this study, the authors use a nuanced approach, integrating key stakeholder theory, perceived value theory and prospect theory. The study constructs a model based on evolutionary game for the privacy and security governance mechanism of autonomous vehicles, involving enterprises, governments and consumers.
Findings
The governance of privacy and security in autonomous driving technology is influenced by key stakeholders’ decision-making behaviors and pivotal factors such as perceived value factors. The study finds that the governmental is influenced to a lesser extent by the decisions of other stakeholders, and factors such as risk preference coefficient, which contribute to perceived value, have a more significant influence than appearance factors like participation costs.
Research limitations/implications
This study lacks an investigation into the risk sensitivity of various stakeholders in different scenarios.
Originality/value
The study delineates the roles and behaviors of key stakeholders and contributes valuable insights toward addressing pertinent risk concerns within the governance of autonomous vehicles. Through the study, the practical application of Responsible Innovation theory has been enriched, addressing the shortcomings in the analysis of micro-level processes within the framework of evolutionary game.
Details
Keywords
Khurram Shahzad, Shakeel Ahmad Khan and Abid Iqbal
For the provision of smart library services to end users, tools of the Internet of Things (IoT) play a significant role. The study aims to discover the factors influencing the…
Abstract
Purpose
For the provision of smart library services to end users, tools of the Internet of Things (IoT) play a significant role. The study aims to discover the factors influencing the adoption of IoT in university libraries, investigate the impact of IoT on university library services and identify challenges to adopt IoT applications in university libraries.
Design/methodology/approach
A systematic literature review was carried out to address the objectives of the study. The 40 most relevant research papers published in the world’s leading digital databases were selected to conduct the study.
Findings
The findings illustrated that rapid growth in technology, perceived benefits, the networked world and the changing landscape of librarianship positively influenced the adoption of IoT in university libraries. The study also displayed that IoT supported library professionals to initiate smart library services, assisted in service efficiency, offered context-based library services, provided tracking facilities and delivered effective management of library systems. Results also revealed that a lack of technical infrastructure, security and privacy concerns, a lack of technological skills and unavailability of policy and strategic planning caused barriers to the successful adoption of IoT applications in university libraries.
Originality/value
The study has provided theoretical implications through a valuable addition to the current literature. It has also offered managerial implications for policymakers to construct productive policies for the implementation of IoT applications in university libraries for the attainment of fruitful outcomes. Finally, the study provides a baseline for understanding the adoption of IoT in academic libraries.
Details
Keywords
Dewan Mehrab Ashrafi, Selim Ahmed and Tazrian Shainam Shahid
This study aims to present a comprehensive investigation into users’ behavioural intentions to use e-pharmacies through the lens of the privacy calculus model. The present study…
Abstract
Purpose
This study aims to present a comprehensive investigation into users’ behavioural intentions to use e-pharmacies through the lens of the privacy calculus model. The present study also investigates the effects of perceived benefit, perceived privacy risk, timeliness and perceived app quality on e-pharmacy usage through the mediating role of trustworthiness.
Design/methodology/approach
The study used a deductive approach and collected data from 338 respondents using the purposive sampling technique. partial least squares structural equation modelling was applied to analyse the data.
Findings
The findings of the study indicate that perceived benefit, perceived privacy risk, timeliness and perceived app quality do not directly impact users’ behavioural intentions towards e-pharmacy adoption. Instead, it demonstrated that perceived benefit, perceived privacy risk, timeliness and perceived app quality influenced behavioural intention indirectly through the mediating role of trustworthiness
Originality/value
This study offers valuable insights to entrepreneurs, marketers and policymakers, enabling them to develop regulations, guidelines and policies that cultivate trust, safeguard privacy, ensure prompt services and create an enabling environment for the adoption of e-pharmacies. The present study also contributes to the existing literature by extending the privacy calculus model with the integration of timeliness and perceived app quality to explain users’ adoption behaviour towards e-pharmacy.
Details
Keywords
Heesup Han, Seongseop (Sam) Kim, Tadesse Bekele Hailu, Amr Al-Ansi, Sandra Maria Correia Loureiro and Jinkyung Jenny Kim
This research paper aims to explore the concerns and determinants of travelers’ behavior toward ChatGPT in the hospitality and tourism context. It also examines the weight of risk…
Abstract
Purpose
This research paper aims to explore the concerns and determinants of travelers’ behavior toward ChatGPT in the hospitality and tourism context. It also examines the weight of risk factors versus that of motivation and innovation characteristics influencing travelers’ approach behaviors toward ChatGPT.
Design/methodology/approach
A cumulative prospect theory was used to determine travelers’ responses to ChatGPT. This study, using a fuzzy-set qualitative approach, explored risk, motivation and innovation factors as determinants of approach behaviors for ChatGPT.
Findings
Findings revealed that risk, motivation and innovation factors were the key triggers of approach behaviors for ChatGPT. An intricate combination effect of the perceived risk, motivation and innovation characteristics was found, and the necessary predictors were determined.
Practical implications
The findings of this study will expand our current knowledge and offer practical insights for the development of ChatGPT in the hospitality and tourism sector.
Originality/value
This study makes a significant contribution to the existing literature by providing a nuanced understanding of the intricate interplay between the various factors that shape customer behavior in the context of technology adoption in hospitality and tourism studies.
Details