Search results
1 – 10 of 17Fahim Ullah, Oluwole Olatunji and Siddra Qayyum
Contemporary technological disruptions are espoused as though they stimulate sustainable growth in the built environment through the Green Internet of Things (G-IoT). Learning…
Abstract
Purpose
Contemporary technological disruptions are espoused as though they stimulate sustainable growth in the built environment through the Green Internet of Things (G-IoT). Learning from discipline-specific experiences, this paper articulates recent advancements in the knowledge and concepts of G-IoT in relation to the construction and smart city sectors. It provides a scoping review for G-IoT as an overlooked dimension. Attention was paid to modern circularity, cleaner production and sustainability as key benefits of G-IoT adoption in line with the United Nations’ Sustainable Development Goals (UN-SDGs). In addition, this study also investigates the current application and adoption strategies of G-IoT.
Design/methodology/approach
This study uses the Preferred Reporting Items for Systematic and Meta-Analyses (PRISMA) review approach. Resources are drawn from Scopus and Web of Science repositories using apt search strings that reflect applications of G-IoT in the built environment in relation to construction management, urban planning, societies and infrastructure. Thematic analysis was used to analyze pertinent themes in the retrieved articles.
Findings
G-IoT is an overlooked dimension in construction and smart cities so far. Thirty-three scholarly articles were reviewed from a total of 82 articles retrieved, from which five themes were identified: G-IoT in buildings, computing, sustainability, waste management and tracking and monitoring. Among other applications, findings show that G-IoT is prominent in smart urban services, healthcare, traffic management, green computing, environmental protection, site safety and waste management. Applicable strategies to hasten adoption include raising awareness, financial incentives, dedicated work approaches, G-IoT technologies and purposeful capacity building among stakeholders. The future of G-IoT in construction and smart city research is in smart drones, building information modeling, digital twins, 3D printing, green computing, robotics and policies that incentivize adoption.
Originality/value
This study adds to the normative literature on envisioning potential strategies for adoption and the future of G-IoT in construction and smart cities as an overlooked dimension. No previous study to date has reviewed pertinent literature in this area, intending to investigate the current applications, adoption strategies and future direction of G-IoT in construction and smart cities. Researchers can expand on the current study by exploring the identified G-IoT applications and adoption strategies in detail, and practitioners can develop implementation policies, regulations and guidelines for holistic G-IoT adoption.
Details
Keywords
Amir Schreiber and Ilan Schreiber
In the modern digital realm, while artificial intelligence (AI) technologies pave the way for unprecedented opportunities, they also give rise to intricate cybersecurity issues…
Abstract
Purpose
In the modern digital realm, while artificial intelligence (AI) technologies pave the way for unprecedented opportunities, they also give rise to intricate cybersecurity issues, including threats like deepfakes and unanticipated AI-induced risks. This study aims to address the insufficient exploration of AI cybersecurity awareness in the current literature.
Design/methodology/approach
Using in-depth surveys across varied sectors (N = 150), the authors analyzed the correlation between the absence of AI risk content in organizational cybersecurity awareness programs and its impact on employee awareness.
Findings
A significant AI-risk knowledge void was observed among users: despite frequent interaction with AI tools, a majority remain unaware of specialized AI threats. A pronounced knowledge difference existed between those that are trained in AI risks and those who are not, more apparent among non-technical personnel and sectors managing sensitive information.
Research limitations/implications
This study paves the way for thorough research, allowing for refinement of awareness initiatives tailored to distinct industries.
Practical implications
It is imperative for organizations to emphasize AI risk training, especially among non-technical staff. Industries handling sensitive data should be at the forefront.
Social implications
Ensuring employees are aware of AI-related threats can lead to a safer digital environment for both organizations and society at large, given the pervasive nature of AI in everyday life.
Originality/value
Unlike most of the papers about AI risks, the authors do not trust subjective data from second hand papers, but use objective authentic data from the authors’ own up-to-date anonymous survey.
Details
Keywords
Chen Zhong, Hong Liu and Hwee-Joo Kam
Cybersecurity competitions can effectively develop skills, but engaging a wide learner spectrum is challenging. This study aims to investigate the perceptions of cybersecurity…
Abstract
Purpose
Cybersecurity competitions can effectively develop skills, but engaging a wide learner spectrum is challenging. This study aims to investigate the perceptions of cybersecurity competitions among Reddit users. These users constitute a substantial demographic of young individuals, often participating in communities oriented towards college students or cybersecurity enthusiasts. The authors specifically focus on novice learners who showed an interest in cybersecurity but have not participated in competitions. By understanding their views and concerns, the authors aim to devise strategies to encourage their continuous involvement in cybersecurity learning. The Reddit platform provides unique access to this significant demographic, contributing to enhancing and diversifying the cybersecurity workforce.
Design/methodology/approach
The authors propose to mine Reddit posts for information about learners’ attitudes, interests and experiences with cybersecurity competitions. To mine Reddit posts, the authors developed a text mining approach that integrates computational text mining and qualitative content analysis techniques, and the authors discussed the advantages of the integrated approach.
Findings
The authors' text mining approach was successful in extracting the major themes from the collected posts. The authors found that motivated learners would want to form a strategic way to facilitate their learning. In addition, hope and fear collide, which exposes the learners’ interests and challenges.
Originality/value
The authors discussed the findings to provide education and training experts with a thorough understanding of novice learners, allowing them to engage them in the cybersecurity industry.
Details
Keywords
Groups of students were enrolled in a course that sought to produce a three-phase theoretical model over three semesters.
Abstract
Purpose
Groups of students were enrolled in a course that sought to produce a three-phase theoretical model over three semesters.
Design/methodology/approach
A design project to comprehensively address school violence was launched at a university in eastern Pennsylvania.
Findings
This article updates the recent and most critical finding of the project by illuminating specific implications of the importance of teacher training and the development toward competence in recognition of children who are emotionally and psychologically injured through proactive measures such as screening for emotional and psychological well-being.
Research limitations/implications
Although the model has not been tested, screening to identify those in need of emotional support and training to support teachers is clear. Screening and training offer important opportunities to help learners build skills toward resilience to soften the effects of trauma.
Practical implications
A view of the “whole child” with regard to academic success could further foster social and emotional development.
Social implications
Early intervention can prevent the onset of symptoms associated with posttraumatic stress and related disorders. This effort alone may significantly reduce the uncomfortable incidences and perhaps ultimate prevention of the violence that is perpetuated among children.
Originality/value
Preliminary research supports a continued conversation regarding effective tools to find children emotionally and psychologically at-risk, which allows teachers an opportunity for timely emotional and psychological interventions.
Details
Keywords
The purpose of this paper is to offer an accessible and interdisciplinary research strategy in organisational ethnography, called action ethnography, that acknowledges key…
Abstract
Purpose
The purpose of this paper is to offer an accessible and interdisciplinary research strategy in organisational ethnography, called action ethnography, that acknowledges key concepts from action research and engaged and immersive ethnography. It aims to encourage methodological innovation and an impact turn in ethnographic practice.
Design/methodology/approach
A working definition of “action ethnography” is provided first. Then, to illustrate how an action ethnography can be designed by considering impact from the outset, the author draws on a study she is undertaking with a grassroots human rights monitoring group, based in England, and then discusses advantages and limitations to the approach.
Findings
The author suggests three main tenets to action ethnography that embrace synergies between action research and ethnography: researcher immersion, intervention leading to change and knowledge contributions that are useful to both practitioners and researchers.
Practical implications
This paper provides researchers who align with aspects of both action research and ethnography with an accessible research strategy to employ, and a better understanding of the interplay between the two approaches when justifying their research designs. It also offers an example of designing an action ethnography in practice.
Originality/value
Whereas “traditional” ethnography has emphasised a contribution to theoretical knowledge, less attention has been on a contribution to practice and to those who ethnographers engage with in the field. Action ethnography challenges researchers to consider the impact of their research from the outset during the research design, rather upon reflection after a study is completed.
Details
Keywords
Junseon Jeong, Minji Park, Hyeonah Jo, Chunju Kim and Ji Hoon Song
This study identifies the policing pre-deployment training content for Korean experts based on needs assessments. Korean policing is at an excellent level to transfer knowledge…
Abstract
Purpose
This study identifies the policing pre-deployment training content for Korean experts based on needs assessments. Korean policing is at an excellent level to transfer knowledge and skills. Pre-deployment training should be designed systematically and training of trainers approaches should be implemented.
Design/methodology/approach
This study used T-tests, Borich needs assessments, and Locus for Focus model analyses to determine the priorities of needs for pre-deployment training in policing. A survey of 116 experienced experts was conducted, with 87 responding (75%).
Findings
The study identified 26 factors that deployed law enforcement professionals want to learn from pre-deployment training. These factors were categorized into three areas: research, training design and methods and understanding of partner countries and international development cooperation. The nine highest priorities for training needs were related to understanding the status and conditions of police training in the country to which policing experts are deployed.
Research limitations/implications
This study was limited to Korean policing experts. And the study did not evaluate the validity of the training curriculum or indicators.
Practical implications
Technical assistance in international policing development cooperation aims to train future trainers who can train local police. This study found that limited learner information and poor communication skills can lead to ineffective technical assistance.
Originality/value
This study highlights the importance of knowledge transfer and effective pre-deployment training for policing. The findings can be used to improve training programs and police human resource development.
Details
Keywords
Tinna Dögg Sigurdardóttir, Lee Rainbow, Adam Gregory, Pippa Gregory and Gisli Hannes Gudjonsson
The present study aims to examine the scope and contribution of behavioural investigative advice (BIA) reports from the National Crime Agency (NCA).
Abstract
Purpose
The present study aims to examine the scope and contribution of behavioural investigative advice (BIA) reports from the National Crime Agency (NCA).
Design/methodology/approach
The 77 BIA reports reviewed were written between 2016 and 2021. They were evaluated using Toulmin’s (1958) strategy for structuring pertinent arguments, current compliance with professional standards, the grounds and backing provided for the claims made and the potential utility of the recommendations provided.
Findings
Consistent with previous research, most of the reports involved murder and sexual offences. The BIA reports met professional standards with extremely high frequency. The 77 reports contained a total of 1,308 claims of which 99% were based on stated grounds. A warrant and/or backing was provided for 73% of the claims. Most of the claims in the BIA reports involved a behavioural evaluation of the crime scene and offender characteristics. The potential utility of the reports was judged to be 95% for informative behavioural crime scene analysis and 40% for potential new lines of enquiry.
Practical implications
The reports should serve as a model for the work of behavioural investigative advisers internationally.
Originality/value
To the best of the authors’ knowledge, this is the first study to systematically evaluate BIA reports commissioned by the NCA; it adds to previous similar studies by evaluating the largest number of BIA reports ever reviewed, and uniquely provides judgement of overall utility.
Details
Keywords
Ambica Ghai, Pradeep Kumar and Samrat Gupta
Web users rely heavily on online content make decisions without assessing the veracity of the content. The online content comprising text, image, video or audio may be tampered…
Abstract
Purpose
Web users rely heavily on online content make decisions without assessing the veracity of the content. The online content comprising text, image, video or audio may be tampered with to influence public opinion. Since the consumers of online information (misinformation) tend to trust the content when the image(s) supplement the text, image manipulation software is increasingly being used to forge the images. To address the crucial problem of image manipulation, this study focusses on developing a deep-learning-based image forgery detection framework.
Design/methodology/approach
The proposed deep-learning-based framework aims to detect images forged using copy-move and splicing techniques. The image transformation technique aids the identification of relevant features for the network to train effectively. After that, the pre-trained customized convolutional neural network is used to train on the public benchmark datasets, and the performance is evaluated on the test dataset using various parameters.
Findings
The comparative analysis of image transformation techniques and experiments conducted on benchmark datasets from a variety of socio-cultural domains establishes the effectiveness and viability of the proposed framework. These findings affirm the potential applicability of proposed framework in real-time image forgery detection.
Research limitations/implications
This study bears implications for several important aspects of research on image forgery detection. First this research adds to recent discussion on feature extraction and learning for image forgery detection. While prior research on image forgery detection, hand-crafted the features, the proposed solution contributes to stream of literature that automatically learns the features and classify the images. Second, this research contributes to ongoing effort in curtailing the spread of misinformation using images. The extant literature on spread of misinformation has prominently focussed on textual data shared over social media platforms. The study addresses the call for greater emphasis on the development of robust image transformation techniques.
Practical implications
This study carries important practical implications for various domains such as forensic sciences, media and journalism where image data is increasingly being used to make inferences. The integration of image forgery detection tools can be helpful in determining the credibility of the article or post before it is shared over the Internet. The content shared over the Internet by the users has become an important component of news reporting. The framework proposed in this paper can be further extended and trained on more annotated real-world data so as to function as a tool for fact-checkers.
Social implications
In the current scenario wherein most of the image forgery detection studies attempt to assess whether the image is real or forged in an offline mode, it is crucial to identify any trending or potential forged image as early as possible. By learning from historical data, the proposed framework can aid in early prediction of forged images to detect the newly emerging forged images even before they occur. In summary, the proposed framework has a potential to mitigate physical spreading and psychological impact of forged images on social media.
Originality/value
This study focusses on copy-move and splicing techniques while integrating transfer learning concepts to classify forged images with high accuracy. The synergistic use of hitherto little explored image transformation techniques and customized convolutional neural network helps design a robust image forgery detection framework. Experiments and findings establish that the proposed framework accurately classifies forged images, thus mitigating the negative socio-cultural spread of misinformation.
Details
Keywords
Hajira Liaqat, Ishfaq Ahmed and Sheikh Usman Yousaf
This study aims to explore the phenomenon of Islamic religious communication and how Islamic banks in Pakistan use religion-based communication, along with its expected outcomes.
Abstract
Purpose
This study aims to explore the phenomenon of Islamic religious communication and how Islamic banks in Pakistan use religion-based communication, along with its expected outcomes.
Design/methodology/approach
Transcendental phenomenology approach is opted using a multi-stage data collection strategy consisting of observations, documentary reviews and semi-structural interviews to get deep into the phenomenon in a particular context.
Findings
Findings highlight Islamic religious communication as workplace Islamic da’wah that is majorly categorized into compulsive da’wah, objectics da’wah and impulsive da’wah, serving its role in bringing spirituality to work through work-faith integration.
Research limitations/implications
The finding of the study can be used in planning, formulating and implementing Islamic da’wah-based model to induce spirituality at work.
Originality/value
This study is the first of its type exploring Islamic da’wah in an organizational context as a mean to bring spirituality at work.
Details
Keywords
Mohd Azril Rezza Mohd Razmin, Amri Mohamad and Maheran Zakaria
This study aims to investigate the factors that influence asset misappropriation fraud among police officers in the Internal Security and Public Order (Malay: Keselamatan Dalam…
Abstract
Purpose
This study aims to investigate the factors that influence asset misappropriation fraud among police officers in the Internal Security and Public Order (Malay: Keselamatan Dalam Negeri dan Ketenteraman Awam [KDNKA]) Department, Royal Malaysian Police (RMP).
Design/methodology/approach
Primary data were collected from a questionnaire-based survey and the data were analysed using descriptive analysis, correlation analysis and multiregression.
Findings
The element of pressure was found to have a negative relationship with asset misappropriation fraud. This result shows the uniqueness of the KDNKA Department in the RMP. The other three elements are found to have a significant positive relationship with asset misappropriation fraud.
Practical implications
This study’s findings can aid academicians in gaining a better understanding of the literature surrounding fraud diamond theory and aid the policymakers in recognizing the signs and possibilities of asset misappropriation fraud in public agencies.
Originality/value
To the best of the authors’ knowledge, this is the first study that uses the KDNKA Department which is the second largest department in RMP as a population in fraud study.
Details