Search results
1 – 10 of 774Ramin Rostamkhani and Thurasamy Ramayah
This chapter of the book seeks to use famous mathematical functions (statistical distribution functions) in evaluating and analyzing supply chain network data related to supply…
Abstract
This chapter of the book seeks to use famous mathematical functions (statistical distribution functions) in evaluating and analyzing supply chain network data related to supply chain management (SCM) elements in organizations. In other words, the main purpose of this chapter is to find the best-fitted statistical distribution functions for SCM data. Explaining how to best fit the statistical distribution function along with the explanation of all possible aspects of a function for selected components of SCM from this chapter will make a significant attraction for production and services experts who will lead their organization to the path of competitive excellence. The main core of the chapter is the reliability values related to the reliability function calculated by the relevant chart and extracting other information based on other aspects of statistical distribution functions such as probability density, cumulative distribution, and failure function. This chapter of the book will turn readers into professional users of statistical distribution functions in mathematics for analyzing supply chain element data.
Details
Keywords
Lerato Aghimien, Clinton Ohis Aigbavboa and Douglas Aghimien
The current era of the fourth industrial revolution has attracted significant research on the use of digital technologies in improving construction project delivery. However, less…
Abstract
The current era of the fourth industrial revolution has attracted significant research on the use of digital technologies in improving construction project delivery. However, less emphasis has been placed on how these digital tools will influence the management of the construction workforce. To this end, using a review of existing works, this chapter explores the fourth industrial revolution and its associated technologies that can positively impact the management of the construction workforce when implemented. Also, the possible challenges that might truncate the successful deployment of digital technologies for effective workforce management were explored. The chapter submitted that implementing workforce management-specific digital platforms and other digital technologies designed for project delivery can aid effective workforce management within construction organisations. Technologies such as cloud computing, the Internet of Things, big data analytics, robotics and automation, and artificial intelligence, among others, offer significant benefits to the effective workforce management of construction organisations. However, several challenges, such as resistance to change due to fear of job loss, cost of investment in digital tools, organisational structure and culture, must be carefully considered as they might affect the successful use of digital tools and by extension, impact the success of workforce management in the organisations.
Details
Keywords
Shafeeq Ahmed Ali, Mohammad H. Allaymoun, Ahmad Yahia Mustafa Al Astal and Rehab Saleh
This chapter focuses on a case study of Kareem Exchange Company and its use of big data analysis to detect and prevent fraud and suspicious financial transactions. The chapter…
Abstract
This chapter focuses on a case study of Kareem Exchange Company and its use of big data analysis to detect and prevent fraud and suspicious financial transactions. The chapter describes the various phases of the big data analysis cycle, including discovery, data preparation, model planning, model building, operationalization, and communicating results, and how the Kareem Exchange Company team implemented each phase. This chapter emphasizes the importance of identifying the business problem, understanding the resources and stakeholders involved, and developing an initial hypothesis to guide the analysis. The case study results demonstrate the potential of big data analysis to improve fraud detection capabilities in financial institutions, leading to informed decision making and action.
Details
Keywords
Aideen Sheehan and Roger O'Sullivan
Research with vulnerable groups is crucial to get their input into public policy design that will directly impact on them. However, there are many methodological and ethical…
Abstract
Research with vulnerable groups is crucial to get their input into public policy design that will directly impact on them. However, there are many methodological and ethical challenges involved in encouraging participation from groups with a wide range of intellectual, cognitive and physical capacities while ensuring that the rights and well-being of participants are protected. Rather than exploring ethical theories, this chapter is a case study describing the practical ethical considerations that were involved in designing and holding a series of focus groups with adult health and social care service users from vulnerable cohorts. It is based on a series of focus groups which the Institute of Public Health (IPH) held with specified cohorts as part of a policy development process on adult safeguarding for the Department of Health (DOH) in Ireland. The four cohorts were people with intellectual disability, cognitive impairments, significant mental health challenges and nursing home residents. This chapter does not describe the findings of the focus groups but outlines the ethical and methodological considerations that arose in designing and conducting this research, and the practical ethical safeguards employed to mitigate risk and comply with Irish and EU General Data Protection Regulation (GDPR) legislation governing health research. It outlines the ethical issues around protecting confidentiality and using incentives to encourage participation, how individuals' capacity to give informed consent was maximized, the risk-assessment and mitigation procedures used to prevent harms arising and the measures put in place to provide follow-up emotional support to participants.
Details
Keywords
Mohammed Elastal, Mohammad H Allaymoun and Tasnim Khaled Elbastawisy
This chapter proposes a model for discovering suspicious financial operations such as money laundering. To achieve this, the authors reviewed research papers on money laundering…
Abstract
This chapter proposes a model for discovering suspicious financial operations such as money laundering. To achieve this, the authors reviewed research papers on money laundering and financial institutions’ cases and problems, especially those related to financial transfers. They also collected primary data through face-to-face semi-structured interviews with financial companies’ owners and experts in financial transfers to identify hypotheses that help discover suspicious transfers. The chapter discusses the six big data analysis cycle phases from problem discovery to model deployment to identify suspicious transfers. The chapter uses hypothetical data and models to discuss the results and focuses on exchange companies willing to analyze financial operations. The chapter proposes tools that exchange companies can use to monitor and prevent suspicious transfers including data visualization and machine learning algorithms.
Details
Keywords
Increased emphasis on offering quality education underscores the need for developing a rigorous process for assessing academic programs in higher education. In this chapter, we…
Abstract
Increased emphasis on offering quality education underscores the need for developing a rigorous process for assessing academic programs in higher education. In this chapter, we develop a practical and rigorous framework for comprehensive assessment of academic programs. This framework generates in-depth communication between the academic departments and the university administration. It provides a useful tool for advancing the university mission, setting priorities, allocating resources, and identifying future areas of potential growth. This data-driven framework covers a wide range of qualitative and quantitative variables. To ensure a smooth and efficient implementation of the assessment process we present the critical stages in the development of a successful program assessment framework − from determining the assessment criteria, establishing the organizational climate, appointing the assessment committee, preparing program self-studies, to collecting and analyzing data. We present real examples from the author’s home institution to illustrate and support the reader’s understanding of the framework.
Details
Keywords
Toyosi Olugbenga Samson Owolabi and Raheemat Adeniran
This chapter focuses on data journalism, a relatively new brand of journalistic practices that take advantage of the growing availability and application of digital data and…
Abstract
This chapter focuses on data journalism, a relatively new brand of journalistic practices that take advantage of the growing availability and application of digital data and computational tools for news production. Although this brand of journalism has been on in some advanced democracies, it is still a relatively new development in Africa, especially Nigeria. Journalists still rely mostly on eyewitness reports and interviews to write their stories, thus leading to lack of depth in media reportage of critical issues. This chapter explores the nature of data journalism conceptualised as a social science pragmatic approach to news gathering and reporting, tracing its history and inherent strengths and weaknesses. It examines the windows of opportunities it provides towards guaranteeing transparency and accountability in Nigeria's nascent democracy. It concludes that, though data journalism complements the conventional investigative reporting to enhance good governance system in Nigeria, strengthening other institutions of government such as the police, judiciary, Economic and Financial Crimes Commission (EFCC), and Independent Corrupt Practices and other related offences Commission (ICPC) becomes imperative in entrenching accountability and transparency in Nigeria.
Details
Keywords
John Thomas Flynn and Lloyd Levine
A quick search of the headlines of major newspapers reveals a treasure trove of technology procurement gone wrong. While the private sector seems to adopt and implement new…
Abstract
A quick search of the headlines of major newspapers reveals a treasure trove of technology procurement gone wrong. While the private sector seems to adopt and implement new technology seamlessly and quickly to deliver for customers, the government struggles to accomplish technology purchases and integrations with the same ease. As governments in the United States are looking to retain their current workforce and attract the next generation of workers, the technological capabilities and ethos of governments will be paramount. With nearly every industry being transformed by technology and Generation T being the first generation to have an ingrained “technology first” mindset, the ability of governments to attract these workers depends, in large part, on the ability to transform their government technology culture, policies, and practices.
In this chapter, the authors examine the administrative branch and observe two key components at the root of most technology failures: poor organizational structure in the bureaucracy and the lack of an empowered Chief Information/Technology Officer. Building upon case studies from Massachusetts and California, this chapter looks at the factors related to failure or success to understand the technology procurement culture. The chapter concludes by presenting four key “best practice” principles of public policy and administration that can be implemented by almost any governmental entity to improve their acquisition and implementation of technology.
Details
Keywords
Vasim Ahmad, Lalit Goyal, Tilottama Singh and Jugander Kumar
This chapter explores the significance of blockchain technology in protecting data for intelligent applications across various industries. Blockchain is a distributed ledger that…
Abstract
This chapter explores the significance of blockchain technology in protecting data for intelligent applications across various industries. Blockchain is a distributed ledger that ensures the immutability and security of transactions. Given the increasing need for security measures in industries, understanding blockchain technology is crucial for preparing for its future applications.
This chapter aims to examine the use of blockchain technology across industries and presents a compilation of existing and upcoming blockchain technologies for intelligent applications. The methodology involves reviewing research to understand the security needs of different industries and providing an overview of methods used to enhance multi-institutional and multidisciplinary research in areas like the financial system, smart grid, and transportation system.
The findings highlight the benefits of blockchain networks in providing transparency, trust, and security for industries. The Responsible Sourcing Blockchain Network (RSBN) is an example that utilizes blockchain's decentralized ledger to track sustainable sourcing from mine to final product. This information can be shared with auditors, corporate governance organizations, and customers.
The practical implications of this chapter are significant, serving as a valuable resource for industries concerned with identity privacy, traceability, immutability, transparency, auditability, and security. Understanding and implementing blockchain technology can address the growing need for secure and intelligent applications, ensuring data protection and enhancing trust in various sectors.
Details
Keywords
Steven A. Harrast, Lori Olsen and Yan (Tricia) Sun
Prior research (Harrast, Olsen, & Sun, 2023) analyzes the eight emerging topics to be included in future CPA exams and discusses their importance to career success and appropriate…
Abstract
Prior research (Harrast, Olsen, & Sun, 2023) analyzes the eight emerging topics to be included in future CPA exams and discusses their importance to career success and appropriate teaching locus in light of survey evidence. They find that the general topic of data analytics is the most important of the eight emerging topics. To further understand the topics most important to career success, this study analyzes subtopics underlying the eight emerging topics. The results show that advanced Excel analysis tools, data visualization, and data extraction, transformation, and loading (ETL) are the most important data analytics subskills for career success according to professionals and that these topics should be both introduced and emphasized in the accounting curriculum. The results provide useful information to educators to prioritize general emerging topics and specific subtopics in the accounting curriculum by taking into account the most pressing needs of the profession.
Details