Search results
1 – 10 of over 22000John Dadzie, Goran Runeson and Grace Ding
Estimates show that close to 90% of the buildings we will need in 2050 are already built and occupied. The increase in the existing building stock has affected energy consumption…
Abstract
Purpose
Estimates show that close to 90% of the buildings we will need in 2050 are already built and occupied. The increase in the existing building stock has affected energy consumption thereby negatively impacting the environment. The purpose of this paper is to assess determinants of sustainable upgrade of existing buildings through the adoption and application of sustainable technologies. The study also ranks sustainable technologies adopted by the professionals who participated in the survey with an in-built case study.
Design/methodology/approach
As part of the overall methodology, a detailed literature review on the nature and characteristics of sustainable upgrade and the sustainable technologies adopted was undertaken. A survey questionnaire with an in-built case study was designed to examine all the sustainable technologies adopted to improve energy consumption in Australia. The survey was administered to sustainability consultants, architects, quantity surveyors, facility managers and engineers in Australia.
Findings
The results show a total of 24 technologies which are mostly adopted to improve energy consumption in existing buildings. A factor analysis shows the main components as: lighting and automation, heating, ventilation and air conditioning (HAVC) systems and equipment, envelope, renewable energy and passive technologies.
Originality/value
The findings bridge the gap in the literature on the adoption and application of sustainable technologies to upgrade existing buildings. The technologies can be adopted to reduce the excessive energy consumption patterns in existing buildings.
Details
Keywords
Elham Rostami, Fredrik Karlsson and Ella Kolkowska
The purpose of this paper is to survey existing information security policy (ISP) management research to scrutinise the extent to which manual and computerised support has been…
Abstract
Purpose
The purpose of this paper is to survey existing information security policy (ISP) management research to scrutinise the extent to which manual and computerised support has been suggested, and the way in which the suggested support has been brought about.
Design/methodology/approach
The results are based on a literature review of ISP management research published between 1990 and 2017.
Findings
Existing research has focused mostly on manual support for managing ISPs. Very few papers have considered computerised support. The entire complexity of the ISP management process has received little attention. Existing research has not focused much on the interaction between the different ISP management phases. Few research methods have been used extensively and intervention-oriented research is rare.
Research limitations/implications
Future research should to a larger extent address the interaction between the ISP management phases, apply more intervention research to develop computerised support for ISP management, investigate to what extent computerised support can enhance integration of ISP management phases and reduce the complexity of such a management process.
Practical implications
The limited focus on computerised support for ISP management affects the kind of advice and artefacts the research community can offer to practitioners.
Originality/value
Today, there are no literature reviews on to what extent computerised support the ISP management process. Findings on how the complexity of ISP management has been addressed and the research methods used extend beyond the existing knowledge base, allowing for a critical discussion of existing research and future research needs.
Details
Keywords
Xiu Susie Fang, Quan Z. Sheng, Xianzhi Wang, Anne H.H. Ngu and Yihong Zhang
This paper aims to propose a system for generating actionable knowledge from Big Data and use this system to construct a comprehensive knowledge base (KB), called GrandBase.
Abstract
Purpose
This paper aims to propose a system for generating actionable knowledge from Big Data and use this system to construct a comprehensive knowledge base (KB), called GrandBase.
Design/methodology/approach
In particular, this study extracts new predicates from four types of data sources, namely, Web texts, Document Object Model (DOM) trees, existing KBs and query stream to augment the ontology of the existing KB (i.e. Freebase). In addition, a graph-based approach to conduct better truth discovery for multi-valued predicates is also proposed.
Findings
Empirical studies demonstrate the effectiveness of the approaches presented in this study and the potential of GrandBase. The future research directions regarding GrandBase construction and extension has also been discussed.
Originality/value
To revolutionize our modern society by using the wisdom of Big Data, considerable KBs have been constructed to feed the massive knowledge-driven applications with Resource Description Framework triples. The important challenges for KB construction include extracting information from large-scale, possibly conflicting and different-structured data sources (i.e. the knowledge extraction problem) and reconciling the conflicts that reside in the sources (i.e. the truth discovery problem). Tremendous research efforts have been contributed on both problems. However, the existing KBs are far from being comprehensive and accurate: first, existing knowledge extraction systems retrieve data from limited types of Web sources; second, existing truth discovery approaches commonly assume each predicate has only one true value. In this paper, the focus is on the problem of generating actionable knowledge from Big Data. A system is proposed, which consists of two phases, namely, knowledge extraction and truth discovery, to construct a broader KB, called GrandBase.
Details
Keywords
Per Johan Carlborg, Nina Hasche and Johan Kask
The purpose of this paper is to extend the knowledge on business model transformation (BMT) by developing an integrative framework for BMT dilemmas, including strategies for…
Abstract
Purpose
The purpose of this paper is to extend the knowledge on business model transformation (BMT) by developing an integrative framework for BMT dilemmas, including strategies for shaping and stabilizing market structures.
Design/methodology/approach
The study uses a case-based approach, with data from the Swedish electric utility industry.
Findings
The findings uncover practices related to both shaping and stabilizing market structure. The study contributes with insights for firms to overcome the BMT dilemma. Shaping strategies involve disruptive innovations while stabilizing strategies concerns incremental improvements in existing structures; by balancing these efforts, firms can find ways toward successful BMT.
Originality/value
With a focus on incumbent firms and the balancing act of BMT in a network, the study covers areas that have scarcely been addressed in the existing literature. Even though most business model literature has focused on shaping consumer markets, the need to consider BMT as a dual-directional process in an industrial context is emphasized in this study.
Details
Keywords
Qiong Bu, Elena Simperl, Adriane Chapman and Eddy Maddalena
Ensuring quality is one of the most significant challenges in microtask crowdsourcing tasks. Aggregation of the collected data from the crowd is one of the important steps to…
Abstract
Purpose
Ensuring quality is one of the most significant challenges in microtask crowdsourcing tasks. Aggregation of the collected data from the crowd is one of the important steps to infer the correct answer, but the existing study seems to be limited to the single-step task. This study aims to look at multiple-step classification tasks and understand aggregation in such cases; hence, it is useful for assessing the classification quality.
Design/methodology/approach
The authors present a model to capture the information of the workflow, questions and answers for both single- and multiple-question classification tasks. They propose an adapted approach on top of the classic approach so that the model can handle tasks with several multiple-choice questions in general instead of a specific domain or any specific hierarchical classifications. They evaluate their approach with three representative tasks from existing citizen science projects in which they have the gold standard created by experts.
Findings
The results show that the approach can provide significant improvements to the overall classification accuracy. The authors’ analysis also demonstrates that all algorithms can achieve higher accuracy for the volunteer- versus paid-generated data sets for the same task. Furthermore, the authors observed interesting patterns in the relationship between the performance of different algorithms and workflow-specific factors including the number of steps and the number of available options in each step.
Originality/value
Due to the nature of crowdsourcing, aggregating the collected data is an important process to understand the quality of crowdsourcing results. Different inference algorithms have been studied for simple microtasks consisting of single questions with two or more answers. However, as classification tasks typically contain many questions, the proposed method can be applied to a wide range of tasks including both single- and multiple-question classification tasks.
Details
Keywords
Benjamin Nitsche, Jonas Brands, Horst Treiblmaier and Jonas Gebhardt
Academics and practitioners have long acknowledged the potential of multiagent systems (MAS) to automate and autonomize decision-making in logistics and supply chain networks…
Abstract
Purpose
Academics and practitioners have long acknowledged the potential of multiagent systems (MAS) to automate and autonomize decision-making in logistics and supply chain networks. Despite the manifold promises of MAS, industry adoption is lagging behind, and the exact benefits of these systems remain unclear. This study aims to fill this knowledge gap by analyzing 11 specific MAS use cases, highlighting their benefits, clarifying how they can help enhance logistics network resilience and identifying existing barriers.
Design/methodology/approach
A three-stage Delphi study was conducted with 18 industry experts. In the first round, these experts identified 11 use cases of MAS and their potential benefits, as well as any barriers that could hinder their adoption. In the second round, they assessed the identified use cases with regard to their potential to enhance logistics network resilience and improve organizational productivity. Furthermore, they estimated the complexity of MAS implementation. In the third round, the experts reassessed their evaluations in light of the evaluations of the other study participants.
Findings
This study proposes 11 specific MAS use cases and illustrates their potential for increasing logistics network resilience and enhancing organizational performance due to autonomous decision-making in informational processes. Furthermore, this study discusses important barriers for MAS, such as lack of standardization, insufficient technological maturity, soaring costs, complex change management and a lack of existing use cases. From a theoretical perspective, it is shown how MAS can contribute to resilience research in supply chain management.
Practical implications
The identification and assessment of diverse MAS use cases informs managers about the potential of this technology and the barriers that need to be overcome.
Originality/value
This study fills a gap in the literature by providing a thorough and up-to-date assessment of the potential of MAS for logistics and supply chain management. To the best of the authors’ knowledge, this is the first study to investigate the relevance of MAS for logistics network resilience using the Delphi method.
Details
Keywords
Lovisa Göransson Ording, Shang Gao and Weifeng Chen
The purpose of this paper is to investigate what role literature-based inputs have on the information security policy (ISP) development in practice.
Abstract
Purpose
The purpose of this paper is to investigate what role literature-based inputs have on the information security policy (ISP) development in practice.
Design/methodology/approach
A literature review is carried out to identify commonly used inputs for ISP development in theory firstly. Secondly, through the lens of institutional theory, an interpretive approach is adapted to study the influence of literature-based inputs in the ISP development in practice. Semi-structured interviews with senior experienced information security officers and managers from the public sector in Sweden are carried out for this research.
Findings
According to the literature review, 10 inputs for ISP development have been identified. The results from the interviews indicate that the role inputs have on the ISP development serves as more than a rational tool, where organisational context, institutional pressures and the search for legitimacy play an important role.
Research limitations/implications
From the institutional perspective, this study signifies the influence of inputs on ISP development can be derived from institutionalised rules or practices established by higher authorities; actions and practices that are perceived as successful and often used by other organisations; the beliefs of what is viewed as appropriate to meet the specific pressures from stakeholders.
Practical implications
This research recommends five practical implications for practitioners working with the ISP development. These recommendations aim to create an understanding of how an ISP could be developed, considering more than the rational functionalist perspective.
Originality/value
To the best of the authors’ knowledge, it is the first of its kind in examining the role of literature-based inputs in ISP development in practice through the lens of institutional theory.
Details
Keywords
Venkatesh Kulkarni, Jaspreet Walia, Heikki Hämmäinen, Seppo Yrjölä, Marja Matinmikko-Blue and Risto Jurva
The purpose of this paper is to build possible future scenarios for indoor connectivity in a venue such as a university campus and build alternative value network configurations…
Abstract
Purpose
The purpose of this paper is to build possible future scenarios for indoor connectivity in a venue such as a university campus and build alternative value network configurations (VNCs) defining different local network deployment options, focused on the Finnish telecom market.
Design/methodology/approach
In this paper, Schoemaker’s scenario planning method (Schoemaker, 1995) is used to construct future scenarios and the VNC method of Casey et al. (2010) is used to build alternative VNCs. The paper studies the Aalto University campus network for current end-user data usage demand and the existing technology used in meeting the end-user needs and forecasts the demand for the next five years to understand the need for 5G.
Findings
This research concludes that with the provision of local spectrum licenses, there is an opportunity for venue owners to take the role of 5G local operator on the venue premises. Furthermore, it enables venue owners to collaborate with the incumbent mobile network operators (MNOs) in a neutral host model and provide venue-specific connectivity services.
Research limitations/implications
A detailed economic assessment for the network deployment in the campus is considered for future study.
Originality/value
Considering the provision for local spectrum licenses, this paper has taken a unique attempt in identifying the future scenarios for local 5G network operations. It provides a strategic direction for the venue owners in adopting 5G technology and whether to make 5G or buy 5G from MNOs.
Details
Keywords
Taro Aso, Toshiyuki Amagasa and Hiroyuki Kitagawa
The purpose of this paper is to propose a scheme that allows users to interactively explore relations between entities in knowledge bases (KBs). KBs store a wide range of…
Abstract
Purpose
The purpose of this paper is to propose a scheme that allows users to interactively explore relations between entities in knowledge bases (KBs). KBs store a wide range of knowledge about real-world entities in a structured form as (subject, predicate, object). Although it is possible to query entities and relations among entities by specifying appropriate query expressions of SPARQL or keyword queries, the structure and the vocabulary are complicated, and it is hard for non-expert users to get the desired information. For this reason, many researchers have proposed faceted search interfaces for KBs. Nevertheless, existing ones are designed for finding entities and are insufficient for finding relations.
Design/methodology/approach
To this problem, the authors propose a novel “relation facet” to find relations between entities. To generate it, they applied clustering on predicates for grouping those predicates that are connected to common objects. Having generated clusters of predicates, the authors generated a facet according to the result. Specifically, they proposed to use a couple of clustering algorithms, namely, agglomerative hierarchical clustering (AHC) and CANDECOMP/PARAFAC (CP) tensor decomposition which is one of the tensor decomposition methods.
Findings
The authors experimentally show test the performance of clustering methods and found that AHC performs better than tensor decomposition. Besides, the authors conducted a user study and show that their proposed scheme performs better than existing ones in the task of searching relations.
Originality/value
The authors propose a relation-oriented faceted search method for KBs that allows users to explore relations between entities. As far as the authors know, this is the first method to focus on the exploration of relations between entities.
Details
Keywords
Jaeyoung Cha, Juyeol Yun and Ho-Yon Hwang
The purpose of this paper is to analyze and compare the performances of novel roadable personal air vehicle (PAV) concepts that meet established operational requirements with…
Abstract
Purpose
The purpose of this paper is to analyze and compare the performances of novel roadable personal air vehicle (PAV) concepts that meet established operational requirements with different types of engines.
Design/methodology/approach
The vehicle configuration was devised considering the dimensions and operational restrictions of the roads, runways and parking lots in South Korea. A folding wing design was adopted for road operations and parking. The propulsion designs considered herein use gasoline, diesel and hybrid architectures for longer-range missions. The sizing point of the roadable PAV that minimizes the wing area was selected, and the rate of climb, ground roll distance, cruise speed and service ceiling requirements were met. For various engine types and mission profiles, the performances of differently sized PAVs were compared with respect to the MTOW, wing area, wing span, thrust-to-weight ratio, wing loading, power-to-weight ratio, brake horsepower and fuel efficiency.
Findings
Unlike automobiles, the weight penalty of the hybrid system because of the additional electrical components reduced the fuel efficiency considerably. When the four engine types were compared, matching the total engine system weight, the internal combustion (IC) engine PAVs had better fuel efficiency rates than the hybrid powered PAVs. Finally, a gasoline-powered PAV configuration was selected as the final design because it had the lowest MTOW, despite its slightly worse fuel efficiency compared to that of the diesel-powered engine.
Research limitations/implications
Although an electric aircraft powered only by batteries most capitalizes on the operating cost, noise and emissions benefits of electric propulsion, it also is most hampered by range limitations. Air traffic integration or any safety, and noise issues were not accounted in this study.
Practical implications
Aircraft sizing is a critical aspect of a system-level study because it is a prerequisite for most design and analysis activities, including those related to the internal layout as well as cost and system effectiveness analyses. The results of this study can be implemented to design a PAV.
Social implications
This study can contribute to the establishment of innovative PAV concepts that can alleviate today’s transportation problems.
Originality/value
This study compared the sizing results of PAVs with hybrid engines with those having IC engines.
Details