Search results

1 – 10 of 114
Article
Publication date: 17 March 2023

Tu Lyu, Yulin Guo and Hao Chen

Based on the cognition–affect–conation pattern, this study explores the factors that affect the intention to use facial recognition services (FRS). The study adopts the driving…

Abstract

Purpose

Based on the cognition–affect–conation pattern, this study explores the factors that affect the intention to use facial recognition services (FRS). The study adopts the driving factor perspective to examine how network externalities influence FRS use intention through the mediating role of satisfaction and the barrier factor perspective to analyze how perceived privacy risk affects FRS use intention through the mediating role of privacy cynicism.

Design/methodology/approach

The data collected from 478 Chinese FRS users are analyzed via partial least squares-based structural equation modeling (PLS-SEM).

Findings

The study produces the following results. (1) FRS use intention is motivated directly by the positive affective factor of satisfaction and the negative affective factor of privacy cynicism. (2) Satisfaction is affected by cognitive factors related to network externalities. Perceived complementarity and perceived compatibility, two indirect network externalities, positively affect satisfaction, whereas perceived critical mass, a direct network externality, does not significantly affect satisfaction. In addition, perceived privacy risk generates privacy cynicism. (3) Resistance to change positively moderates the relationship between privacy cynicism and intention to use FRS.

Originality/value

This study extends knowledge on people's use of FRS by exploring affect- and cognitive-based factors and finding that the affect-based factors (satisfaction and privacy cynicism) play fully mediating roles in the relationship between the cognitive-based factors and use intention. This study also expands the cognitive boundaries of FRS use by exploring the functional condition between affect-based factors and use intention, that is, the moderating role of resistance to use.

Details

Information Technology & People, vol. 37 no. 3
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 28 February 2023

Sara Rashidian, Robin Drogemuller, Sara Omrani and Fereshteh Banakar

The application of integrated project delivery (IPD) in conjunction with building information modeling (BIM) and Lean Construction (LC) as the efficient method for improving…

Abstract

Purpose

The application of integrated project delivery (IPD) in conjunction with building information modeling (BIM) and Lean Construction (LC) as the efficient method for improving collaboration and delivering construction projects has been acknowledged by construction academics and professionals. Once organizations have fully embraced BIM, IPD and LC integration, a measurement tool such as a maturity model (MM) for benchmarking their progress and setting realistic goals for continuous improvement will be required. In the context of MMs literature, however, no comprehensive analysis of these three construction management methods has been published to reveal the current trends and common themes in which the models have approached each other.

Design/methodology/approach

Therefore, this study integrates systematic literature review (SLR) and thematic analysis techniques to review and categorize the related MMs; the key themes in which the interrelationship between BIM, IPD and LC MMs has been discussed and conceptualized in the attributes; the shared characteristics of the existing BIM, IPD and LC MMs, as well as their strengths and limitations. The Preferred Reporting Items for Systematic Reviews (PRISMA) method has been used as the primary procedure for article screening and reviewing published papers between 2007 and 2022.

Findings

Despite the growth of BIM, IPD and LC integration publications and acknowledgment in the literature, no MM has been established that holistically measures BIM, IPD and LC integration in an organization. This study identifies five interrelated and overlapping themes indicative of the collaboration of BIM, IPD and LC in existing MMs' structure, including customer satisfaction, waste minimization, Lean practices and cultural and legal aspects. Furthermore, the MMs' common characteristics, strengths and limitations are evaluated to provide a foundation for developing future BIM, IPD and LC-related MMs.

Practical implications

This paper examines the current status of research and the knowledge gaps around BIM, IPD and LC MMs. In addition, the highlighted major themes serve as a foundation for academics who intend to develop integrated BIM, IPD, and LC MMs. This will enable researchers to build upon these themes and establish a comprehensive list of maturity attributes fulfilling the BIM, IPD and LC requirements and principles. In addition, the MMs' BIM, IPD and LC compatibility themes, which go beyond themes' intended characteristics in silos, increase industry practitioners' awareness of the underlying factors of BIM, IPD and LC integration.

Originality/value

This review article is the first of a kind to analyze the interaction of IPD, BIM and LC in the context of MMs in current AEC literature. This study concludes that BIM, IPD and LC share several joint cornerstones according to the existing MMs.

Details

Smart and Sustainable Built Environment, vol. 13 no. 3
Type: Research Article
ISSN: 2046-6099

Keywords

Article
Publication date: 24 April 2024

Bahman Arasteh and Ali Ghaffari

Reducing the number of generated mutants by clustering redundant mutants, reducing the execution time by decreasing the number of generated mutants and reducing the cost of…

Abstract

Purpose

Reducing the number of generated mutants by clustering redundant mutants, reducing the execution time by decreasing the number of generated mutants and reducing the cost of mutation testing are the main goals of this study.

Design/methodology/approach

In this study, a method is suggested to identify and prone the redundant mutants. In the method, first, the program source code is analyzed by the developed parser to filter out the effectless instructions; then the remaining instructions are mutated by the standard mutation operators. The single-line mutants are partially executed by the developed instruction evaluator. Next, a clustering method is used to group the single-line mutants with the same results. There is only one complete run per cluster.

Findings

The results of experiments on the Java benchmarks indicate that the proposed method causes a 53.51 per cent reduction in the number of mutants and a 57.64 per cent time reduction compared to similar experiments in the MuJava and MuClipse tools.

Originality/value

Developing a classifier that takes the source code of the program and classifies the programs' instructions into effective and effectless classes using a dependency graph; filtering out the effectless instructions reduces the total number of mutants generated; Developing and implementing an instruction parser and instruction-level mutant generator for Java programs; the mutant generator takes instruction in the original program as a string and generates its single-line mutants based on the standard mutation operators in MuJava; Developing a stack-based evaluator that takes an instruction (original or mutant) and the test data and evaluates its result without executing the whole program.

Details

Data Technologies and Applications, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2514-9288

Keywords

Article
Publication date: 14 February 2023

Hua Pang

By building and examining an integral model, the principal objectives of this research are to systematically explore how indirect and direct network externalities lead to user…

Abstract

Purpose

By building and examining an integral model, the principal objectives of this research are to systematically explore how indirect and direct network externalities lead to user loyalty toward WeChat through the mediating effect of perceived gratifications.

Design/methodology/approach

The data were collected through an online survey of 688 young people in Mainland China. To empirically assess the conceptual model, zero-order correlation analyses and structural equation modeling were carried out utilizing web-based data.

Findings

Path analysis results demonstrate that indirect network externalities and direct network externalities exert a significant impact on users' hedonic gratifications and utilitarian gratifications. Moreover, the study discovers the significant mediating influences of utilitarian gratifications on the association between indirect network externalities and user loyalty.

Research limitations/implications

Theoretically, this article may extend the scope of diverse studies on the association between network externalities and perceived gratifications and offer fresh insights into how mobile social media could actually improve user loyalty through enhancing perceived values among younger generation. Practically, this research assists mobile social media practitioners in retaining users and gaining competitive advantages over rival applications.

Originality/value

Although the extraordinary growth of WeChat has successfully become the dominant media by which individuals develop interpersonal network and contact with others, the roles of perceived gratifications between network externalities and user loyalty toward WeChat have not yet been investigated in depth. These obtained outcomes not only enrich the existing literature regarding the relationship between network externalities and affective response, but also offer fresh insights to mobile social media designers, marketers and users.

Details

Aslib Journal of Information Management, vol. 76 no. 3
Type: Research Article
ISSN: 2050-3806

Keywords

Article
Publication date: 22 April 2024

Arash Arianpoor and Ahmad Abdollahi

The purpose of this study is to propose a framework for the convergence of maturity model and education and evaluation in accounting.

Abstract

Purpose

The purpose of this study is to propose a framework for the convergence of maturity model and education and evaluation in accounting.

Design/methodology/approach

The present research was conducted in two phases. In the first phase, to determine the indicators of convergence of the maturity model and education and evaluation in accounting, a Meta-Synthesis method was used. The conceptual model includes two dimensions of “Teaching and learning processes” and “Evaluation methods"; five levels of initial, repeatable, defined, managed and optimized; and a total number of 35 indicators. In the second phase, a questionnaire was developed, and academics as accounting faculty members in Iranian public universities were employed to fill out the questionnaire electronically and present a final framework. Having received the questionnaires, 66 questionnaires were analyzed statistically.

Findings

The results showed that the two dimensions of “Teaching and learning processes” and “Evaluation methods” considering initial, repeatable, defined, managed and optimized levels include 35 indicators, which form a framework for the convergence of maturity model and education and evaluation in accounting. The results show that both dimensions have positive and significant regression path coefficients in the convergence model. Moreover, the dimension of teaching and learning processes has the highest regression path coefficient indicating a greater impact on the convergence model. Besides, all five levels have positive and significant regression path coefficients with dimensions. Finally, in this study, all indicators were prioritized according to five levels.

Originality/value

Due to the success of maturity models and the urgent developments that require transformative improvements in accounting education, maturity models can respond to the challenges associated with education and learning in accounting. Thus, conceiving an image of the convergence of maturity model, education and evaluation in accounting seems imperative which has been scarcely investigated previously.

Details

Accounting Research Journal, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1030-9616

Keywords

Article
Publication date: 22 April 2024

Rafael Sartor de Oliveira, Mário Franco and Margarida Rodrigues

Cooperative agreements between universities and firms (U–F) have gained prominence. However, the literature on organisational culture and the formation of cooperation agreements…

Abstract

Purpose

Cooperative agreements between universities and firms (U–F) have gained prominence. However, the literature on organisational culture and the formation of cooperation agreements is scarce. This study aims to analyse, from the perspective of the managers of small- and medium-sized enterprises (SMEs) and those in charge in universities, the perceptions of the influence of organisational culture on this type of U–F cooperation.

Design/methodology/approach

To this end, multiple case studies were adopted, involving cooperation agreements between a Portuguese and eight SMEs incubated in UBImedical. Semi-structured interviews were used to gather information, aiming to understand the meaning, importance and possible obstacles caused by organisational culture in this U–F cooperation agreement.

Findings

Content analysis of the results obtained leads to the conclusion that cultural compatibility is a crucial factor for successful U–F cooperation. The exchange of knowledge, mutual trust and flexibility between those involved are identified as key determinants to build shared norms that allow a more productive, assertive union.

Practical implications

The study represents an important tool to support SME managers and those in charge of universities, as the evidence obtained can help them to define policies and actions with regard to the U–F cooperation process. More precisely, these SME and university managers could give more attention to culture in future cooperation agreements.

Originality/value

This study advances understanding of the role of organisational culture in a cooperation agreement since this was a gap identified in the literature on the topic. It also contributes to the existing body of work on U–F cooperation, demonstrating that organisational culture is considered important by partners in these agreements and should be adjusted towards compatible alignment of each party’s expectations.

Details

International Journal of Organizational Analysis, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1934-8835

Keywords

Article
Publication date: 14 June 2023

Manaf Al-Okaily

The purpose of this study is to gain empirical insights into whether accounting information systems (AIS) usage matters among Jordanian small and medium-sized enterprises (SMEs…

Abstract

Purpose

The purpose of this study is to gain empirical insights into whether accounting information systems (AIS) usage matters among Jordanian small and medium-sized enterprises (SMEs) during the period of COVID-19 pandemic.

Design/methodology/approach

The suggested research model in the current study is based on the extending technology acceptance model (TAM) to test the antecedents’ factors that impact on AIS usage among SMEs. To test the proposed research model, partial least squares structural equation modeling (PLS-SEM) was used.

Findings

The empirical findings revealed all postulated hypotheses were accepted except H3. Contrary to what is expected, the empirical outcomes confirmed that perceived compatibility does not affect the perceived usefulness of AIS, and hence, the related hypothesis was rejected.

Originality/value

The results of the current research could be beneficial to a number of managers (owners) to obtain a better understanding of the benefits of AIS success usage among Jordanian SMEs performance during crises time as the COVID-19 pandemic crisis.

Details

Information Discovery and Delivery, vol. 52 no. 2
Type: Research Article
ISSN: 2398-6247

Keywords

Article
Publication date: 16 October 2023

Miguel Calvo and Marta Beltrán

This paper aims to propose a new method to derive custom dynamic cyber risk metrics based on the well-known Goal, Question, Metric (GQM) approach. A framework that complements it…

Abstract

Purpose

This paper aims to propose a new method to derive custom dynamic cyber risk metrics based on the well-known Goal, Question, Metric (GQM) approach. A framework that complements it and makes it much easier to use has been proposed too. Both, the method and the framework, have been validated within two challenging application domains: continuous risk assessment within a smart farm and risk-based adaptive security to reconfigure a Web application firewall.

Design/methodology/approach

The authors have identified a problem and provided motivation. They have developed their theory and engineered a new method and a framework to complement it. They have demonstrated the proposed method and framework work, validating them in two real use cases.

Findings

The GQM method, often applied within the software quality field, is a good basis for proposing a method to define new tailored cyber risk metrics that meet the requirements of current application domains. A comprehensive framework that formalises possible goals and questions translated to potential measurements can greatly facilitate the use of this method.

Originality/value

The proposed method enables the application of the GQM approach to cyber risk measurement. The proposed framework allows new cyber risk metrics to be inferred by choosing between suggested goals and questions and measuring the relevant elements of probability and impact. The authors’ approach demonstrates to be generic and flexible enough to allow very different organisations with heterogeneous requirements to derive tailored metrics useful for their particular risk management processes.

Details

Information & Computer Security, vol. 32 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 29 April 2024

Jinkyung Jenny Kim, Jungsun (Sunny) Kim, Kyu-Hyeon Joo and Jinsoo Hwang

The purpose of this study is to investigate the key predictors and outcomes of task–technology fit (TTF) of facial recognition payment systems with the moderating role of cultural…

Abstract

Purpose

The purpose of this study is to investigate the key predictors and outcomes of task–technology fit (TTF) of facial recognition payment systems with the moderating role of cultural differences in the restaurant industry.

Design/methodology/approach

The survey responses were collected from 336 South Korean and 336 US restaurant customers.

Findings

The results revealed that function significantly affected TTF in both groups. Unique to the Korean sample, emotion was found to be a significant determinant of TTF, whereas convenience and social influence were key predictors of TTF only for the US sample. TTF had significant and positive effects on the three dimensions of behavioral intentions in both groups. The result of multi-group analysis showed that cultural differences moderated the effect of convenience on TTF and the effect of emotion on TTF.

Originality/value

The authors provided recommendations for restaurant operators and technology companies seeking to improve customer TTF and acceptance of facial recognition payment systems for the first time.

研究目的

本研究旨在调查面部识别支付系统任务技术匹配(TTF)的关键前置因素和影响, 以文化差异为调节变量, 研究其在餐饮行业的应用。

研究方法

我们收集了来自336名韩国和336名美国餐厅顾客的调查回答。

研究发现

结果显示, 在两组中, 功能显著影响TTF。对于韩国样本来说, 情感被发现是TTF的重要决定因素, 而对于美国样本来说, 方便性和社会影响是TTF的关键预测因素。在两组中, TTF对行为意向的三个维度均产生了显著且积极的影响。多组分析结果显示, 文化差异在方便性对TTF的影响以及情感对TTF的影响中起到了调节作用。

研究创新

我们首次为寻求改善顾客TTF和接受面部识别支付系统的餐厅经营者和技术公司提供了建议。

Open Access
Article
Publication date: 12 March 2024

Ákos Nagy and Noémi Krátki

This study aims to explore the ways that social enterprises (SE) create value by embedding themselves in networks through the process of social innovation (SI). The processes of…

Abstract

Purpose

This study aims to explore the ways that social enterprises (SE) create value by embedding themselves in networks through the process of social innovation (SI). The processes of achieving common social missions were studied through selected organizations using an open approach to SI. Novel operational structures as well as unique forms of created value were explored.

Design/methodology/approach

Two organizations embedded in local and international networks were studied and were chosen due to their SI profiles. The study was based on qualitative exploratory research. In-depth analysis was conducted through interviews, open discussions, document analysis as well as personal observation to understand the dynamic interrelatedness of the main factors influencing success of SI ventures.

Findings

This paper identified the role of SI in SEs embedded in networks. Furthermore, the social value creation processes of these organizations as well as the value they create were explored. Based on the findings, SI is rooted in the personality of the included members of the network. The tools of collaboration are platforms that connect the network members to each other. The embedded organizations apply the concept of community sharing with the aim of social value creation.

Research limitations/implications

By focusing mainly on system design principles, the sample consists of mainly those at the core of organizations in facilitator roles, leaving peripheral actor perceptions to be determined by secondhand observations.

Originality/value

While providing a general summary of factors influencing SI activities from extent literature, the paper mainly contributes by providing deeper insight into complex models of SI practices used by SEs. The paper further contributes to popularizing the growing role of SI activities in SEs.

Details

Social Enterprise Journal, vol. 20 no. 3
Type: Research Article
ISSN: 1750-8614

Keywords

1 – 10 of 114