Search results

1 – 10 of 70
Article
Publication date: 2 May 2024

Mikias Gugssa, Long Li, Lina Pu, Ali Gurbuz, Yu Luo and Jun Wang

Computer vision and deep learning (DL) methods have been investigated for personal protective equipment (PPE) monitoring and detection for construction workers’ safety. However…

Abstract

Purpose

Computer vision and deep learning (DL) methods have been investigated for personal protective equipment (PPE) monitoring and detection for construction workers’ safety. However, it is still challenging to implement automated safety monitoring methods in near real time or in a time-efficient manner in real construction practices. Therefore, this study developed a novel solution to enhance the time efficiency to achieve near-real-time safety glove detection and meanwhile preserve data privacy.

Design/methodology/approach

The developed method comprises two primary components: (1) transfer learning methods to detect safety gloves and (2) edge computing to improve time efficiency and data privacy. To compare the developed edge computing-based method with the currently widely used cloud computing-based methods, a comprehensive comparative analysis was conducted from both the implementation and theory perspectives, providing insights into the developed approach’s performance.

Findings

Three DL models achieved mean average precision (mAP) scores ranging from 74.92% to 84.31% for safety glove detection. The other two methods by combining object detection and classification achieved mAP as 89.91% for hand detection and 100% for glove classification. From both implementation and theory perspectives, the edge computing-based method detected gloves faster than the cloud computing-based method. The edge computing-based method achieved a detection latency of 36%–68% shorter than the cloud computing-based method in the implementation perspective. The findings highlight edge computing’s potential for near-real-time detection with improved data privacy.

Originality/value

This study implemented and evaluated DL-based safety monitoring methods on different computing infrastructures to investigate their time efficiency. This study contributes to existing knowledge by demonstrating how edge computing can be used with DL models (without sacrificing their performance) to improve PPE-glove monitoring in a time-efficient manner as well as maintain data privacy.

Details

Engineering, Construction and Architectural Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0969-9988

Keywords

Article
Publication date: 24 March 2023

Laila Dahabiyeh, Ali Farooq, Farhan Ahmad and Yousra Javed

During the past few years, social media has faced the challenge of maintaining its user base. Reports show that the social media giants such as Facebook and Twitter experienced a…

Abstract

Purpose

During the past few years, social media has faced the challenge of maintaining its user base. Reports show that the social media giants such as Facebook and Twitter experienced a decline in their users. Taking WhatsApp's recent change of its terms of use as the case of this study and using the push-pull-mooring model and a configurational perspective, this study aims to identify pathways for switching intentions.

Design/methodology/approach

Data were collected from 624 WhatsApp users recruited from Amazon Mechanical Turk and analyzed using fuzzy set qualitative comparative analysis (fsQCA).

Findings

The findings identify seven configurations for high switching intentions and four configurations for low intentions to switch. Firm reputation and critical mass increase intention to switch, while low firm reputation and absence of attractive alternatives hinder switching.

Research limitations/implications

This study extends extant literature on social media migration by identifying configurations that result in high and low switching intention among messaging applications.

Practical implications

The study identifies factors the technology service providers should consider to attract new users and retain existing users.

Originality/value

This study complements the extant literature on switching intention that explains the phenomenon based on a net-effect approach by offering an alternative view that focuses on the existence of multiple pathways to social media switching. It further advances the authors’ understanding of the relevant importance of switching factors.

Details

Information Technology & People, vol. 37 no. 3
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 11 April 2023

Xingchen Zhou, Pei-Luen Patrick Rau and Zhuoni Jie

This study aims to reveal how mobile app stickiness is formed and how the stickiness formation process differs for apps of different social levels.

Abstract

Purpose

This study aims to reveal how mobile app stickiness is formed and how the stickiness formation process differs for apps of different social levels.

Design/methodology/approach

This study proposed and validated a stickiness formation model following the cognitive–affective–conative framework. Data were collected from surveys of 1,240 mobile app users and analyzed using structural equation modeling. Multigroup analysis was applied to contrast the stickiness formation process among apps of different social levels.

Findings

This study revealed a causal link between cognitive, affective and conative factors. It found partial mediation effects of trust in the association between perceptions and satisfaction, and the full mediation role of satisfaction and personal investment (PI) in the effects of subjective norm (SN) on stickiness. The multigroup analysis results suggested that social media affordances benefit stickiness through increased PI and strengthened effects of SN on PI. However, it damages stickiness through increased perceived privacy risk (PPR), decreased trust and strengthened effects of PPR on trust.

Originality/value

This study contributes to both stickiness scholars and practitioners, as it builds a model to understand the stickiness formation process and reveals the effects of the “go social” strategy. The novelty of this study is that it examined social influences, considered privacy issues and revealed two mediation mechanisms. The findings can guide the improvement of mobile app stickiness and the application of the “go social” strategy.

Details

Information Technology & People, vol. 37 no. 3
Type: Research Article
ISSN: 0959-3845

Keywords

Open Access
Article
Publication date: 20 June 2023

Marcos Dieste, Guido Orzes, Giovanna Culot, Marco Sartor and Guido Nassimbeni

A positive outlook on the impact of Industry 4.0 (I4.0) on sustainability prevails in the literature. However, some studies have highlighted potential areas of concern that have…

4231

Abstract

Purpose

A positive outlook on the impact of Industry 4.0 (I4.0) on sustainability prevails in the literature. However, some studies have highlighted potential areas of concern that have not yet been systematically addressed. The goal of this study is to challenge the assumption of a sustainable Fourth Industrial Revolution by (1) identifying the possible unintended negative impacts of I4.0 technologies on sustainability; (2) highlighting the underlying motivations and potential actions to mitigate such impacts; and (3) developing and evaluating alternative assumptions on the impacts of I4.0 technologies on sustainability.

Design/methodology/approach

Building on a problematization approach, a systematic literature review was conducted to develop potential alternative assumptions about the negative impacts of I4.0 on sustainability. Then, a Delphi study was carried out with 43 experts from academia and practice to evaluate the alternative assumptions. Two rounds of data collection were performed until reaching the convergence or stability of the responses.

Findings

The results highlight various unintended negative effects on environmental and social aspects that challenge the literature. The reasons behind the high/low probability of occurrence, the severity of each impact in the next five years and corrective actions are also identified. Unintended negative environmental effects are less controversial than social effects and are therefore more likely to generate widely accepted theoretical propositions. Finally, the alternative hypothesis ground is partially accepted by the panel, indicating that the problematization process has effectively opened up new perspectives for analysis.

Originality/value

This study is one of the few to systematically problematize the assumptions of the I4.0 and sustainability literature, generating research propositions that reveal several avenues for future research.

Details

International Journal of Operations & Production Management, vol. 44 no. 5
Type: Research Article
ISSN: 0144-3577

Keywords

Article
Publication date: 11 April 2024

This paper aims to review the latest management developments across the globe and pinpoint practical implications from cutting-edge research and case studies.

Abstract

Purpose

This paper aims to review the latest management developments across the globe and pinpoint practical implications from cutting-edge research and case studies.

Design/methodology/approach

This briefing is prepared by an independent writer who adds their own impartial comments and places the articles in context.

Findings

Cloud computing services provide firms with increased scope to grow and prosper. Successful adoption of cloud demands a focus on organizational learning and talent management to ensure that individuals, groups and units are equipped with relevant skills and capabilities needed to perform effectively in their roles as they evolve in the digital age.

Originality/value

The briefing saves busy executives and researchers hours of reading time by selecting only the very best, most pertinent information and presenting it in a condensed and easy-to-digest format.

Details

Development and Learning in Organizations: An International Journal, vol. 38 no. 3
Type: Research Article
ISSN: 1477-7282

Keywords

Article
Publication date: 16 October 2023

Miguel Calvo and Marta Beltrán

This paper aims to propose a new method to derive custom dynamic cyber risk metrics based on the well-known Goal, Question, Metric (GQM) approach. A framework that complements it…

Abstract

Purpose

This paper aims to propose a new method to derive custom dynamic cyber risk metrics based on the well-known Goal, Question, Metric (GQM) approach. A framework that complements it and makes it much easier to use has been proposed too. Both, the method and the framework, have been validated within two challenging application domains: continuous risk assessment within a smart farm and risk-based adaptive security to reconfigure a Web application firewall.

Design/methodology/approach

The authors have identified a problem and provided motivation. They have developed their theory and engineered a new method and a framework to complement it. They have demonstrated the proposed method and framework work, validating them in two real use cases.

Findings

The GQM method, often applied within the software quality field, is a good basis for proposing a method to define new tailored cyber risk metrics that meet the requirements of current application domains. A comprehensive framework that formalises possible goals and questions translated to potential measurements can greatly facilitate the use of this method.

Originality/value

The proposed method enables the application of the GQM approach to cyber risk measurement. The proposed framework allows new cyber risk metrics to be inferred by choosing between suggested goals and questions and measuring the relevant elements of probability and impact. The authors’ approach demonstrates to be generic and flexible enough to allow very different organisations with heterogeneous requirements to derive tailored metrics useful for their particular risk management processes.

Details

Information & Computer Security, vol. 32 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

Open Access
Article
Publication date: 14 February 2024

Chao Lu and Xiaohai Xin

The promotion of autonomous vehicles introduces privacy and security risks, underscoring the pressing need for responsible innovation implementation. To more effectively address…

Abstract

Purpose

The promotion of autonomous vehicles introduces privacy and security risks, underscoring the pressing need for responsible innovation implementation. To more effectively address the societal risks posed by autonomous vehicles, considering collaborative engagement of key stakeholders is essential. This study aims to provide insights into the governance of potential privacy and security issues in the innovation of autonomous driving technology by analyzing the micro-level decision-making processes of various stakeholders.

Design/methodology/approach

For this study, the authors use a nuanced approach, integrating key stakeholder theory, perceived value theory and prospect theory. The study constructs a model based on evolutionary game for the privacy and security governance mechanism of autonomous vehicles, involving enterprises, governments and consumers.

Findings

The governance of privacy and security in autonomous driving technology is influenced by key stakeholders’ decision-making behaviors and pivotal factors such as perceived value factors. The study finds that the governmental is influenced to a lesser extent by the decisions of other stakeholders, and factors such as risk preference coefficient, which contribute to perceived value, have a more significant influence than appearance factors like participation costs.

Research limitations/implications

This study lacks an investigation into the risk sensitivity of various stakeholders in different scenarios.

Originality/value

The study delineates the roles and behaviors of key stakeholders and contributes valuable insights toward addressing pertinent risk concerns within the governance of autonomous vehicles. Through the study, the practical application of Responsible Innovation theory has been enriched, addressing the shortcomings in the analysis of micro-level processes within the framework of evolutionary game.

Details

Asia Pacific Journal of Innovation and Entrepreneurship, vol. 18 no. 2
Type: Research Article
ISSN: 2071-1395

Keywords

Article
Publication date: 10 January 2024

Khurram Shahzad, Shakeel Ahmad Khan and Abid Iqbal

For the provision of smart library services to end users, tools of the Internet of Things (IoT) play a significant role. The study aims to discover the factors influencing the…

192

Abstract

Purpose

For the provision of smart library services to end users, tools of the Internet of Things (IoT) play a significant role. The study aims to discover the factors influencing the adoption of IoT in university libraries, investigate the impact of IoT on university library services and identify challenges to adopt IoT applications in university libraries.

Design/methodology/approach

A systematic literature review was carried out to address the objectives of the study. The 40 most relevant research papers published in the world’s leading digital databases were selected to conduct the study.

Findings

The findings illustrated that rapid growth in technology, perceived benefits, the networked world and the changing landscape of librarianship positively influenced the adoption of IoT in university libraries. The study also displayed that IoT supported library professionals to initiate smart library services, assisted in service efficiency, offered context-based library services, provided tracking facilities and delivered effective management of library systems. Results also revealed that a lack of technical infrastructure, security and privacy concerns, a lack of technological skills and unavailability of policy and strategic planning caused barriers to the successful adoption of IoT applications in university libraries.

Originality/value

The study has provided theoretical implications through a valuable addition to the current literature. It has also offered managerial implications for policymakers to construct productive policies for the implementation of IoT applications in university libraries for the attainment of fruitful outcomes. Finally, the study provides a baseline for understanding the adoption of IoT in academic libraries.

Details

The Electronic Library , vol. 42 no. 2
Type: Research Article
ISSN: 0264-0473

Keywords

Article
Publication date: 2 May 2024

Dewan Mehrab Ashrafi, Selim Ahmed and Tazrian Shainam Shahid

This study aims to present a comprehensive investigation into users’ behavioural intentions to use e-pharmacies through the lens of the privacy calculus model. The present study…

Abstract

Purpose

This study aims to present a comprehensive investigation into users’ behavioural intentions to use e-pharmacies through the lens of the privacy calculus model. The present study also investigates the effects of perceived benefit, perceived privacy risk, timeliness and perceived app quality on e-pharmacy usage through the mediating role of trustworthiness.

Design/methodology/approach

The study used a deductive approach and collected data from 338 respondents using the purposive sampling technique. partial least squares structural equation modelling was applied to analyse the data.

Findings

The findings of the study indicate that perceived benefit, perceived privacy risk, timeliness and perceived app quality do not directly impact users’ behavioural intentions towards e-pharmacy adoption. Instead, it demonstrated that perceived benefit, perceived privacy risk, timeliness and perceived app quality influenced behavioural intention indirectly through the mediating role of trustworthiness

Originality/value

This study offers valuable insights to entrepreneurs, marketers and policymakers, enabling them to develop regulations, guidelines and policies that cultivate trust, safeguard privacy, ensure prompt services and create an enabling environment for the adoption of e-pharmacies. The present study also contributes to the existing literature by extending the privacy calculus model with the integration of timeliness and perceived app quality to explain users’ adoption behaviour towards e-pharmacy.

Details

Journal of Science and Technology Policy Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2053-4620

Keywords

Article
Publication date: 1 May 2024

Heesup Han, Seongseop (Sam) Kim, Tadesse Bekele Hailu, Amr Al-Ansi, Sandra Maria Correia Loureiro and Jinkyung Jenny Kim

This research paper aims to explore the concerns and determinants of travelers’ behavior toward ChatGPT in the hospitality and tourism context. It also examines the weight of risk…

Abstract

Purpose

This research paper aims to explore the concerns and determinants of travelers’ behavior toward ChatGPT in the hospitality and tourism context. It also examines the weight of risk factors versus that of motivation and innovation characteristics influencing travelers’ approach behaviors toward ChatGPT.

Design/methodology/approach

A cumulative prospect theory was used to determine travelers’ responses to ChatGPT. This study, using a fuzzy-set qualitative approach, explored risk, motivation and innovation factors as determinants of approach behaviors for ChatGPT.

Findings

Findings revealed that risk, motivation and innovation factors were the key triggers of approach behaviors for ChatGPT. An intricate combination effect of the perceived risk, motivation and innovation characteristics was found, and the necessary predictors were determined.

Practical implications

The findings of this study will expand our current knowledge and offer practical insights for the development of ChatGPT in the hospitality and tourism sector.

Originality/value

This study makes a significant contribution to the existing literature by providing a nuanced understanding of the intricate interplay between the various factors that shape customer behavior in the context of technology adoption in hospitality and tourism studies.

Details

International Journal of Contemporary Hospitality Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0959-6119

Keywords

1 – 10 of 70