Search results

1 – 10 of 27
Article
Publication date: 8 July 2022

Uzair Khan, Hikmat Ullah Khan, Saqib Iqbal and Hamza Munir

Image Processing is an emerging field that is used to extract information from images. In recent years, this field has received immense attention from researchers, especially in…

Abstract

Purpose

Image Processing is an emerging field that is used to extract information from images. In recent years, this field has received immense attention from researchers, especially in the research domains of object detection, Biomedical Imaging and Semantic segmentation. In this study, a bibliometric analysis of publications related to image processing in the Science Expanded Index Extended (SCI-Expanded) has been performed. Several parameters have been analyzed such as annual scientific production, citations per article, most cited documents, top 20 articles, most relevant authors, authors evaluation using y-index, top and most relevant sources (journals) and hot topics.

Design/methodology/approach

The Bibliographic data has been extracted from the Web of Science which is well known and the world's top database of bibliographic citations of multidisciplinary areas that covers the various journals of computer science, engineering, medical and social sciences.

Findings

The research work in image processing is meager in the past decade, however, from 2014 to 2019, it increases dramatically. Recently, the IEEE Access journal is the most relevant source with an average of 115 publications per year. The USA is most productive and its publications are highly cited while China comes in second place. Image Segmentation, Feature Extraction and Medical Image Processing are hot topics in recent years. The National Natural Science Foundation of China provides 8% of all funds for Image Processing. As Image Processing is now becoming one of the most critical fields, the research productivity has enhanced during the past five years and more work is done while the era of 2005–2013 was the area with the least amount of work in this area.

Originality/value

This research is novel in this regard that no previous research focuses on Bibliometric Analysis in the Image Processing domain, which is one of the hot research areas in computer science and engineering.

Open Access
Article
Publication date: 19 October 2023

Tinna Dögg Sigurdardóttir, Lee Rainbow, Adam Gregory, Pippa Gregory and Gisli Hannes Gudjonsson

The present study aims to examine the scope and contribution of behavioural investigative advice (BIA) reports from the National Crime Agency (NCA).

2658

Abstract

Purpose

The present study aims to examine the scope and contribution of behavioural investigative advice (BIA) reports from the National Crime Agency (NCA).

Design/methodology/approach

The 77 BIA reports reviewed were written between 2016 and 2021. They were evaluated using Toulmin’s (1958) strategy for structuring pertinent arguments, current compliance with professional standards, the grounds and backing provided for the claims made and the potential utility of the recommendations provided.

Findings

Consistent with previous research, most of the reports involved murder and sexual offences. The BIA reports met professional standards with extremely high frequency. The 77 reports contained a total of 1,308 claims of which 99% were based on stated grounds. A warrant and/or backing was provided for 73% of the claims. Most of the claims in the BIA reports involved a behavioural evaluation of the crime scene and offender characteristics. The potential utility of the reports was judged to be 95% for informative behavioural crime scene analysis and 40% for potential new lines of enquiry.

Practical implications

The reports should serve as a model for the work of behavioural investigative advisers internationally.

Originality/value

To the best of the authors’ knowledge, this is the first study to systematically evaluate BIA reports commissioned by the NCA; it adds to previous similar studies by evaluating the largest number of BIA reports ever reviewed, and uniquely provides judgement of overall utility.

Article
Publication date: 13 December 2023

Sofia Martynovich

The interpretation of any emerging form or period in art history was never a trivial task. However, in the case of digital art, technology, becoming an integral part, multiplied…

Abstract

Purpose

The interpretation of any emerging form or period in art history was never a trivial task. However, in the case of digital art, technology, becoming an integral part, multiplied the complexity of describing, systematizing and evaluating it. This article investigates the most common metadata standards for the documentation of art as a broad category and suggests possible next steps toward an extended metadata standard for digital art.

Design/methodology/approach

Describing several techno-cultural phenomena formed in the last decade, manifesting the extendibility of digital art (its ability to be easily extended across multiple modalities), the article, at first, points to the long overdue need to re-evaluate the standards around it. Then it suggests a deeper analysis through a comparative study. In the scope of the study three artworks, The Arnolfini Portrait (Jan van Eyck), an iconic example of the early Renaissance, The World's First Collaborative Sentence (Douglas Davis), a classic example of early Internet art and Fake It Till You Make It (Maya Man), a prominent example of the blockchain art, are examined following the structure of the VRA Core 4.0 standard.

Findings

The comparative study demonstrates that digital art is more multi-semantic than traditional physical art, and requires new taxonomies as well as approaches for data acquisition.

Originality/value

Acknowledging that digital art simply has not yet evolved to the stage of being systematically collected by cultural institutions for documentation, curation and preservation, but otherwise, in the past few years, it has been at the front-center of social, economic and technological trends, the article suggests looking for hints on the future-proof extended metadata standard in some of those trends.

Details

Journal of Documentation, vol. 80 no. 2
Type: Research Article
ISSN: 0022-0418

Keywords

Open Access
Article
Publication date: 29 July 2020

Abdullah Alharbi, Wajdi Alhakami, Sami Bourouis, Fatma Najar and Nizar Bouguila

We propose in this paper a novel reliable detection method to recognize forged inpainting images. Detecting potential forgeries and authenticating the content of digital images is…

Abstract

We propose in this paper a novel reliable detection method to recognize forged inpainting images. Detecting potential forgeries and authenticating the content of digital images is extremely challenging and important for many applications. The proposed approach involves developing new probabilistic support vector machines (SVMs) kernels from a flexible generative statistical model named “bounded generalized Gaussian mixture model”. The developed learning framework has the advantage to combine properly the benefits of both discriminative and generative models and to include prior knowledge about the nature of data. It can effectively recognize if an image is a tampered one and also to identify both forged and authentic images. The obtained results confirmed that the developed framework has good performance under numerous inpainted images.

Details

Applied Computing and Informatics, vol. 20 no. 1/2
Type: Research Article
ISSN: 2634-1964

Keywords

Open Access
Article
Publication date: 7 January 2022

Ahmad Samarji

Governments worldwide have been trying to direct more students towards STEM specialty areas, but the number of students majoring in STEM and seeking a STEM career path is not…

Abstract

Governments worldwide have been trying to direct more students towards STEM specialty areas, but the number of students majoring in STEM and seeking a STEM career path is not proportional to their efforts. Additionally, the COVID-19 pandemic has brought to the surface the unrealistic expectations and false assumptions held by the general public about STEM fields. These have mainly been shaped by the “T” in the acronym, substituting technology for science. This brief urges for a policy shift in STEM and science education to reveal the true nature of science, emphasizing that science is not about providing definite answers nor granting miraculous solutions but about creating and disseminating knowledge based on the most accurate outcome informed by empirical evidence. Such a policy change will have a dual effect. First, it will ensure students authentically appreciate the nature of science, serve as agents of scientific thinking and reasoning within their communities, and become more oriented towards STEM majors. Secondly, this policy shift will prompt more realistic expectations and valid assumptions about science for the general public, which will help reduce public confusion and uncertainty, specifically at times of pandemics or emergencies.

Open Access
Article
Publication date: 25 November 2021

Daniel McCarville

Benford's Law is an empirical observation about the frequency of digits in a variety of naturally occurring data sets. Auditors and forensic scientists have used Benford's Law to…

Abstract

Benford's Law is an empirical observation about the frequency of digits in a variety of naturally occurring data sets. Auditors and forensic scientists have used Benford's Law to detect erroneous data in accounting and legal usage. One well-known limitation is that Benford's Law fails when data have clear minimum and maximum values. Many kinds of education data, including assessment scores, typically include hard maximums and therefore do not meet the parametric assumptions of Benford's Law. This paper implements a transformation procedure which allows for assessment data to be compared to Benford's Law. As a case study, a data quality assessment of oral language scores from the Early Childhood Longitudinal Study, Kindergarten (ECLS-K) study is used and higher risk data segments detected. The same method could be used to evaluate other concerns, such as test fraud, or other bounded datasets.

Details

Emerald Open Research, vol. 1 no. 3
Type: Research Article
ISSN: 2631-3952

Keywords

Article
Publication date: 19 May 2023

Abhishek Behl, Vijay Pereira, Achint Nigam, Samuel Wamba and Rahul Sindhwani

The purpose of this paper is to investigate the potential of NFTs in revolutionizing innovation management and information systems. Innovations done by firms are blatantly used by…

Abstract

Purpose

The purpose of this paper is to investigate the potential of NFTs in revolutionizing innovation management and information systems. Innovations done by firms are blatantly used by other firms to develop cheap knock-off. This leads to huge economic loses to the firm investing in research and development activities. Firms are in need of trusted, immutable and verifiable means of storing information which cannot be used by others, even if publically available without their consent. Non-fungible tokens (NFTs) appear to be one such solution to this problem that has recently attracted a lot of investor interest. Using NFTs the information is tokenized and is stored in a secure manner.

Design/methodology/approach

Through this scoping review, the authors investigate the influence of NFTs towards the innovation management from the dual aspects of management and information systems. This scoping review is underpinned by the five-stage framework by Arksey and O’Malley. The five stages of Arksey and O’Malley’s framework were used in this analysis to classify the literature through five stages of identifying the initial research questions; locating relevant studies; study selection; charting the data; and compiling, summarizing and reporting the results.

Findings

This study suggests that NFTs on the blockchain have significant potential to revolutionize innovation management and information systems. Theoretical frameworks used in investigating the role of digital tokens in blockchain management are mainly based on contracts, diversity theory, portfolio theory and faking likelihood theory. The study reveals gaps in the literature, particularly in the under-researched areas of behavioural psychology and social psychology theories. The appropriate regulation and regulation authority for different types of digital tokens are required. The study also presents archetypes that represent patterns in the current landscape of blockchain tokens, which have significant potential for future research and practical applications.

Originality/value

This study is unique in its approach to assessing the future of NFTs in the field of innovation and information management. While many existing reviews have focused on describing the progress and development of NFTs in the past, this study takes a forward-looking perspective and projects the future potential of NFTs. This innovative approach allows for a deeper understanding of the potential impact of NFTs in various fields such as entrepreneurship, innovation management and tokenomics. Therefore, this study contributes to the literature on NFTs by providing insights and recommendations for future research and practical applications.

Details

Journal of Knowledge Management, vol. 28 no. 1
Type: Research Article
ISSN: 1367-3270

Keywords

Article
Publication date: 27 June 2023

Pranakusuma Sudhana, Noermijati Noermijati, Ananda Sabil Hussein and Nur Khusniyah Indrawati

This paper aims to explain the unsuccessful relationship between the awareness of prominent international education brands and enrollment intention.

Abstract

Purpose

This paper aims to explain the unsuccessful relationship between the awareness of prominent international education brands and enrollment intention.

Design/methodology/approach

A serial mediation model encompassing perceived congruity and brand attitude was developed and tested using the PLS-SEM technique, involving 132 respondents.

Findings

The results revealed that the awareness of international education brands, subsequently perceived as internally congruent with the prospective students’ self-image in terms of resource sufficiency, will yield enrollment intention by forming the desired brand attitude.

Research limitations/implications

This paper includes generalizability as its limitation, with suggestions to undertake the broader scope of studies. Future research could examine other variables to enhance the model.

Practical implications

This paper presents theoretical and managerial implications for higher education branding and marketing.

Originality/value

To the best of the authors’ knowledge, this study could be the first to discuss the international university landscape in Indonesia. In addition, the proposed model could be a plausible framework for explaining the intention to accept not only international education brands but also other brands of goods and services, thereby benefiting both educational and consumer research.

Article
Publication date: 11 September 2023

Balakrishnan Unny R., Samik Shome, Amit Shankar and Saroj Kumar Pani

This study aims to provide a systematic review of consumer privacy literature in the context of smartphones and undertake a comprehensive analysis of academic research on this…

Abstract

Purpose

This study aims to provide a systematic review of consumer privacy literature in the context of smartphones and undertake a comprehensive analysis of academic research on this evolving research area.

Design/methodology/approach

This review synthesises antecedents, consequences and mediators reported in consumer privacy literature and presents these factors in a conceptual framework to demonstrate the consumer privacy phenomenon.

Findings

Based on the synthesis of constructs reported in the existing literature, a conceptual framework is proposed highlighting antecedents, mediators and outcomes of experiential marketing efforts. Finally, this study deciphers overlooked areas of consumer privacy in the context of smartphone research and provides insightful directions to advance research in this domain in terms of theory development, context, characteristics and methodology.

Originality/value

This study significantly contributes to consumer behaviour literature, specifically consumer privacy literature.

Details

Journal of Consumer Marketing, vol. 41 no. 1
Type: Research Article
ISSN: 0736-3761

Keywords

Article
Publication date: 16 January 2024

Călin Mihail Rangu, Leonardo Badea, Mircea Constantin Scheau, Larisa Găbudeanu, Iulian Panait and Valentin Radu

In recent years, the frequency and severity of cybersecurity incidents have prompted customers to seek out specialized insurance products. However, this has also presented…

Abstract

Purpose

In recent years, the frequency and severity of cybersecurity incidents have prompted customers to seek out specialized insurance products. However, this has also presented insurers with operational challenges and increased costs. The assessment of risks for health systems and cyber–physical systems (CPS) necessitates a heightened degree of attention. The significant values of potential damages and claims request a solid insurance system, part of cyber-resilience. This research paper focuses on the emerging cyber insurance market that is currently in the process of standardizing and improving its risk analysis concerning the potential insured entity.

Design/methodology/approach

The authors' approach involves a quantitative analysis utilizing a Likert-style questionnaire designed to survey cyber insurance professionals. The authors' aim is to identify the current methods used in gathering information from potential clients, as well as the manner in which this information is analyzed by the insurers. Additionally, the authors gather insights on potential improvements that could be made to this process.

Findings

The study the authors elaborated it has a particularly important cyber and risk components for insurance area, because it addresses a “niche” area not yet proper addressed in specialized literature – cyber insurance. Cyber risk management approaches are not uniform at the international level, nor at the insurer level. Also, not all insurers can perform solid assessments, especially since their companies should first prove that they are fully compliant with international cyber security standards.

Research limitations/implications

This research has concentrated on analyzing the current practices in terms of gathering information about the insured entity before issuing the cyber insurance policy, level of details concerning the cyber security posture of the insured entity and way such information should be analyzed in a standardized and useful manner. The novelty of this research resides in the analysis performed as detailed above and the proposals in terms of information gathered, depth of analysis and standardization of approach made. Future work on the topic can focus on the standardization process for analyzing cyber risk for insurance clients, to improve the proposal based also on historical elements and trends in the market. Thus, future research can further refine the standardization process to analyze in more depth the way this can be implemented and included in relevant legislation at the EU level.

Practical implications

Proposed improvements include proposals in terms of the level of detail and the usefulness of an independent centralized approach for information gathering and analysis, especially given the re-insurance and brokerage activities. The authors also propose a common practical procedural approach in risk management, with the involvement of insurance companies and certification institutions of cyber security auditors.

Originality/value

The study investigates the information gathered by insurers from potential clients of cyber insurance and the way this is analyzed and updated for issuance of the insurance policy.

Details

The Journal of Risk Finance, vol. 25 no. 2
Type: Research Article
ISSN: 1526-5943

Keywords

Access

Year

Last 6 months (27)

Content type

Article (27)
1 – 10 of 27