Search results
1 – 10 of 742Judith Fauth, Tanya Bloch and Lucio Soibelman
Building permitting is mostly a manual, labor intensive and time-consuming process. Initiatives for streamlining the process are not always helpful since they often fail to…
Abstract
Purpose
Building permitting is mostly a manual, labor intensive and time-consuming process. Initiatives for streamlining the process are not always helpful since they often fail to address the core problems within the process. A framework for modeling the permitting process can be useful to identify bottlenecks, core challenges and best practices. Hence, the authors aim to demonstrate and validate a previously suggested workflow for permit process modeling using the permitting process in Israel as a test case.
Design/methodology/approach
The authors implement qualitative expert interviews for data acquisition. The collected data are then processed for a qualitative data analysis. The results of the analysis are then validated using a focus group workshop in the field of building permits. In the test case the focus group consisted of Israeli experts.
Findings
The authors present a detailed overview of the as-is building permit process in Israel and the existing challenges. Through this test case, the authors found that the framework is applicable in different countries and that it can provide valuable insights into the core problems within the process. In addition, application of the same framework in different countries can provide comparable results that would allow the authors to identify best practices.
Originality/value
The major contribution of this work is the development and validation of a framework for building permitting process modeling which can be used to identify existing challenges and bottlenecks in the process. Implementing a structured and unified approach provides an opportunity to easily compare processes in different countries to identify best practices.
Details
Keywords
Luís Jacques de Sousa, João Poças Martins, Luís Sanhudo and João Santos Baptista
This study aims to review recent advances towards the implementation of ANN and NLP applications during the budgeting phase of the construction process. During this phase…
Abstract
Purpose
This study aims to review recent advances towards the implementation of ANN and NLP applications during the budgeting phase of the construction process. During this phase, construction companies must assess the scope of each task and map the client’s expectations to an internal database of tasks, resources and costs. Quantity surveyors carry out this assessment manually with little to no computer aid, within very austere time constraints, even though these results determine the company’s bid quality and are contractually binding.
Design/methodology/approach
This paper seeks to compile applications of machine learning (ML) and natural language processing in the architectural engineering and construction sector to find which methodologies can assist this assessment. The paper carries out a systematic literature review, following the preferred reporting items for systematic reviews and meta-analyses guidelines, to survey the main scientific contributions within the topic of text classification (TC) for budgeting in construction.
Findings
This work concludes that it is necessary to develop data sets that represent the variety of tasks in construction, achieve higher accuracy algorithms, widen the scope of their application and reduce the need for expert validation of the results. Although full automation is not within reach in the short term, TC algorithms can provide helpful support tools.
Originality/value
Given the increasing interest in ML for construction and recent developments, the findings disclosed in this paper contribute to the body of knowledge, provide a more automated perspective on budgeting in construction and break ground for further implementation of text-based ML in budgeting for construction.
Details
Keywords
Joe Garcia, Russell Shannon, Aaron Jacobson, William Mosca, Michael Burger and Roberto Maldonado
This paper aims to describe an effort to provide for a robust and secure software development paradigm intended to support DevSecOps in a naval aviation enterprise (NAE) software…
Abstract
Purpose
This paper aims to describe an effort to provide for a robust and secure software development paradigm intended to support DevSecOps in a naval aviation enterprise (NAE) software support activity (SSA), with said paradigm supporting strong traceability and provability concerning the SSA’s output product, known as an operational flight program (OFP). Through a secure development environment (SDE), each critical software development function performed on said OFP during its development has a corresponding record represented on a blockchain.
Design/methodology/approach
An SDE is implemented as a virtual machine or container incorporating software development tools that are modified to support blockchain transactions. Each critical software development function, e.g. editing, compiling, linking, generates a blockchain transaction message with associated information embedded in the output of a said function that, together, can be used to prove integrity and support traceability. An attestation process is used to provide proof that the toolchain containing SDE is not subject to unauthorized modification at the time said critical function is performed.
Findings
Blockchain methods are shown to be a viable approach for supporting exhaustive traceability and strong provability of development system integrity for mission-critical software produced by an NAE SSA for NAE embedded systems software.
Practical implications
A blockchain-based authentication approach that could be implemented at the OFP point-of-load would provide for fine-grain authentication of all OFP software components, with each component or module having its own proof-of-integrity (including the integrity of the used development tools) over its entire development history.
Originality/value
Many SSAs have established control procedures for development such as check-out/check-in. This does not prove the SSA output software is secure. For one thing, a build system does not necessarily enforce procedures in a way that is determinable from the output. Furthermore, the SSA toolchain itself could be attacked. The approach described in this paper enforces security policy and embeds information into the output of every development function that can be cross-referenced to blockchain transaction records for provability and traceability that only trusted tools, free from unauthorized modifications, are used in software development. A key original concept of this approach is that it treats assigned developer time as a transferable digital currency.
Details
Keywords
- Software development
- Blockchain
- Cybersecurity
- Operational flight program
- Secure development environment
- Secure virtual machine
- Zero trust
- Embedded systems
- Mission-critical systems
- OFP
- DevOps
- DevSecOps
- Software support activity
- SSA
- SDE
- Permissioned blockchain
- Cryptocurrency
- Time-limited authorization for developer action
- TADA
- Code signing
- Trusted software guard
- SGX
- Trusted eXecution technology
- TXT
- Trusted platform module
- Self-hosting
- Controlled access blockchain
- CABlock
- Role-based access control
- RBAC
Deborah Richards, Salma Banu Nazeer Khan, Paul Formosa and Sarah Bankins
To protect information and communication technology (ICT) infrastructure and resources against poor cyber hygiene behaviours, organisations commonly require internal users to…
Abstract
Purpose
To protect information and communication technology (ICT) infrastructure and resources against poor cyber hygiene behaviours, organisations commonly require internal users to confirm they will abide by an ICT Code of Conduct. Before commencing enrolment, university students sign ICT policies, however, individuals can ignore or act contrary to these policies. This study aims to evaluate whether students can apply ICT Codes of Conduct and explores viable approaches for ensuring that students understand how to act ethically and in accordance with such codes.
Design/methodology/approach
The authors designed a between-subjects experiment involving 260 students’ responses to five scenario-pairs that involve breach/non-breach of a university’s ICT policy following a priming intervention to heighten awareness of ICT policy or relevant ethical principles, with a control group receiving no priming.
Findings
This study found a significant difference in students’ responses to the breach versus non-breach cases, indicating their ability to apply the ICT Code of Conduct. Qualitative comments revealed the priming materials influenced their reasoning.
Research limitations/implications
The authors’ priming interventions were inadequate for improving breach recognition compared to the control group. More nuanced and targeted priming interventions are suggested for future studies.
Practical implications
Appropriate application of ICT Code of Conduct can be measured by collecting student/employee responses to breach/non-breach scenario pairs based on the Code and embedded with ethical principles.
Social implications
Shared awareness and protection of ICT resources.
Originality/value
Compliance with ICT Codes of Conduct by students is under-investigated. This study shows that code-based scenarios can measure understanding and suggest that targeted priming might offer a non-resource intensive training approach.
Details
Keywords
Riccardo Stacchezzini, Francesca Rossignoli and Silvano Corbella
This article investigates the implementation of a compliance programme (CP) in terms of how practitioners conceive of and execute the responsibilities arising from this corporate…
Abstract
Purpose
This article investigates the implementation of a compliance programme (CP) in terms of how practitioners conceive of and execute the responsibilities arising from this corporate governance mechanism.
Design/methodology/approach
This study involves a practice lens approach forms the case study analysis and interpretation, involving both interviews and documentary materials collected from an Italian company with prolonged compliance experience. Schatzki's (2002, 2010) practice organisation framework guides the interpretation of CP as a practice organised by rules, practical and general understandings and teleoaffective structures.
Findings
CP practice evolves over time. A practical understanding of daily actions required to accomplish the CP and a general understanding of the responsibilities connected with the CP, such as the attitudes with which the CP is performed, are mutually constitutive and jointly favour this evolution. Dedicated artefacts – such as IT platforms, training seminars and compliance performance indicators – help spread both of these types of understanding. These artefacts also align practitioners' general understanding with the CP's teleoaffective structures imposed, including the CP's assigned objectives and the desired reactions to them.
Research limitations/implications
The findings have theoretical and practical implications by revealing the relevance of practitioners' understanding of corporate governance mechanisms in their implementation processes.
Originality/value
This study reveals the potential benefits of practice lens approaches in corporate governance studies. It responds to the call for qualitative studies that demonstrate corporate governance as implemented in daily activities.
Details
Keywords
The objective of this study is to assess the level of corporate governance (CG) compliance and identify determinants of high compliance in Indonesian publicly listed corporations…
Abstract
Purpose
The objective of this study is to assess the level of corporate governance (CG) compliance and identify determinants of high compliance in Indonesian publicly listed corporations including family and nonfamily firms. The country uses a voluntary disclosure approach to enforce its regulations; thus, it is important to identify the factors affecting compliance.
Design/methodology/approach
Employing a logistic regression model, this paper analyzes the CG index of high-compliance vs. poor-compliance companies and emphasizes factors that contribute to better governance compliance. The CG index of high-compliant firms is almost twice as high as that of low-compliant firms.
Findings
The study explores factors that contribute to high CG in an emerging market like Indonesian corporations. The study's findings indicate that family-owned businesses predominate in the low-compliance group. High-compliance firms are older and larger with higher financial performance, free float and leverage, as well as a positive influence of the founder's great leadership. The results support theoretical arguments that concentrated ownership and excessive majority shareholder control are key factors in determining the likelihood of good governance practices by firms. Hence, the market and regulators should devise effective strategies to encourage and reward high compliance.
Research limitations/implications
The findings of the research offer several implications for the academic community and policymakers. Improving CG at the firm level is a viable goal, even though the agenda to reform minority investor protection laws and increase judicial quality is challenging and may take a long time to show significant results. Moreover, this study has some limitations that could be addressed in future research. The study focuses on a single-country setting, Indonesia. There are cultural aspects and governance settings that may be unique in the Indonesian context, which may limit the applicability of the findings to other countries with their own cultural settings and institutional legal framework.
Originality/value
The study investigates the factors that influence high governance compliance in specific CG regulations designed for the emerging Indonesian market. The study also discovers evidence that the crisis period has a favorable impact on the firm's decision to comply with governance provisions.
Details
Keywords
Yvonne Ziegler, Vincenzo Uli and Mahmoud Tatari
The purpose of this paper, positioned in the halal logistics research domain, is to bridge the gap between the theory of halal logistics and halal logistics' empirical…
Abstract
Purpose
The purpose of this paper, positioned in the halal logistics research domain, is to bridge the gap between the theory of halal logistics and halal logistics' empirical implementation through a business process reengineering (BPR) project in the context of a major European airport (i.e. Frankfurt Airport, Fraport AG).
Design/methodology/approach
An in-depth case study approach has been adopted in the authors' business processes reengineering proposal. Prior investigations on the topic maintained that “business process analysis and activity elimination” (BP and AE) and “problem analysis” (PA) are the most widespread approaches when the prominent business reengineering dimension under analysis is the specific process/task. Consistently, the authors adopted a six-step BP&AE-based model in order to implement the halal logistics requirements in the context of an air cargo supply chain.
Findings
This paper addresses fundamental issues about the analysis and the redesign of air cargo processes when halal shipments are taken into account. Conceptual breakthroughs of new processes are suggested. The paper sheds light on potential issues which may arise when adapting the extant air cargo processes to halal logistics guidelines. In addition, the paper suggests an appropriate resolution scheme articulated in two stages of progressively higher compliance to halal logistics according to the Malaysian standards (MS).
Research limitations/implications
The outcome of this work has implications for practitioners, researchers, and transport associations. For practitioners, the study offers an immediately applicable implementation plan which is ready to be discussed with all agents involved in the business reengineering (BR) process. For researchers, the study offers a basis for future halal logistics reengineering projects, both from a theoretical and from an empirical standpoint. Finally, the collaboration of transport associations will become mandatory due to an update of the International Air Transport Association (IATA) code system that includes a dedicated halal code, “HAL”, for halal air cargo shipments.
Originality/value
The concept of halal logistics is still in the infant stage and there is a complete lack of academic publications, especially empirical implementations of halal logistics principles. The authors' project provides detailed guidelines to help air cargo operators operating in non-Muslim-dominant countries to reengineer their internal processes and, in doing so, to comply with halal logistics and principles.
Details
Keywords
Bert Steens, Anouk de Bont and Frans Roozen
The plethora of changes in the corporate governance landscape over the past two decades has the potential to tighten governance regimes and influence the preference of supervisory…
Abstract
Purpose
The plethora of changes in the corporate governance landscape over the past two decades has the potential to tighten governance regimes and influence the preference of supervisory board members vis-à-vis the involved decision-making role of business unit (BU) controllers and their independent fiduciary role. Stricter financial reporting and compliance requirements may lead organizations to prioritize the latter role. However, recent studies support the need to balance these roles, inducing the potential for role conflict. The purpose of this study is to shed light on the influence of a tight and loose governance regime on this balance as preferred by supervisory board members.
Design/methodology/approach
This study uses a unique data set from an experiment among 73 supervisory board members. The authors take their perspective because compliance with governance codes and corporate policies are relevant topics for their function.
Findings
The authors find evidence for the preference of supervisory board members for “all-round” BU controllers who, irrespective of the governance regime, demonstrate substantial levels of fiduciary and decision-making qualities and deal with the resulting role conflict.
Originality/value
The outcomes of the experiment among supervisory board members provide evidence for their preferences concerning the balance of the two primary controller roles and for the potential of role conflict. The authors have not found studies that provide such empirical evidence.
Details
Keywords
Hong Kim Duong, Marco Fasan and Giorgio Gotti
Previous literature provides mixed evidence about the effectiveness of a code of ethics in limiting managerial opportunism. While some studies find that code of ethics is merely…
Abstract
Purpose
Previous literature provides mixed evidence about the effectiveness of a code of ethics in limiting managerial opportunism. While some studies find that code of ethics is merely window-dressing, others find that they do influence managers' behavior. The present study investigates whether the quality of a code of ethics decreases the cost of equity by limiting managerial opportunism.
Design/methodology/approach
In order to test the hypothesis, the authors perform an empirical analysis on a sample of US companies in the 2004–2012 period. The results are robust to a battery of robustness analyses that the authors performed in order to take care of endogeneity.
Findings
Empirical results indicate that a higher quality code of ethics is associated with a lower cost of equity. In other words, firms with a more comprehensive code of ethics and better-designed implementation procedures limit managerial opportunism and pay a lower cost of equity because they are perceived by investors to be less risky.
Research limitations/implications
Practical implications
Social implications
Originality/value
The authors contribute to the literature in two ways. First, by looking at the market reaction to the code of ethics, thus capturing all its indirect possible benefits and second, by measuring not only the existence but also the quality of a code of ethics. Based on the results, policymakers may choose to further promote codes of ethics as an effective corporate governance mechanism.
Details
Keywords
Ana Odorović and Karsten Wenzlaff
The paper discusses the rationale for a widespread reliance on Codes of Conduct (CoC) in European crowdfunding through the lenses of economic theories of self-regulation. By…
Abstract
Purpose
The paper discusses the rationale for a widespread reliance on Codes of Conduct (CoC) in European crowdfunding through the lenses of economic theories of self-regulation. By analysing the institutional design of CoCs in crowdfunding, the paper illustrates the differences in their regulatory context, inclusiveness, monitoring and enforcement. It offers the first systematic overview of substantial rules of CoCs in crowdfunding.
Design/methodology/approach
A comparative case study of nine CoCs in Europe is used to illustrate differences in their institutional design and discern the economic purpose of the CoC.
Findings
The institutional design of different CoCs in Europe mainly supports voluntary theories of self-regulation. In particular, the theory of reputation commons has the most explanatory power. The substantial rules of CoC in different markets show the potential sources of market failure through the perspectives of platforms.
Research limitations/implications
CoCs appear in various regulatory, cultural, and industry contexts of different countries. Some of the institutional design features of CoC might be a result of these characteristics.
Practical implications
Crowdfunding associations wishing to develop their own CoC may learn from a comparative overview of key provisions.
Social implications
For governments in Europe, contemplating creating or revising bespoke crowdfunding regimes, the paper identifies areas where crowdfunding platforms perceive market failure.
Originality/value
This paper is the first systematic study of self-regulatory institutions in European crowdfunding. The paper employs a theoretical framework for the analysis of self-regulation in crowdfunding and provides a comparison of a regulatory context, inclusiveness, monitoring and enforcement of different CoCs in Europe.
Details