Search results
1 – 10 of 95Fahim Ullah, Oluwole Olatunji and Siddra Qayyum
Contemporary technological disruptions are espoused as though they stimulate sustainable growth in the built environment through the Green Internet of Things (G-IoT). Learning…
Abstract
Purpose
Contemporary technological disruptions are espoused as though they stimulate sustainable growth in the built environment through the Green Internet of Things (G-IoT). Learning from discipline-specific experiences, this paper articulates recent advancements in the knowledge and concepts of G-IoT in relation to the construction and smart city sectors. It provides a scoping review for G-IoT as an overlooked dimension. Attention was paid to modern circularity, cleaner production and sustainability as key benefits of G-IoT adoption in line with the United Nations’ Sustainable Development Goals (UN-SDGs). In addition, this study also investigates the current application and adoption strategies of G-IoT.
Design/methodology/approach
This study uses the Preferred Reporting Items for Systematic and Meta-Analyses (PRISMA) review approach. Resources are drawn from Scopus and Web of Science repositories using apt search strings that reflect applications of G-IoT in the built environment in relation to construction management, urban planning, societies and infrastructure. Thematic analysis was used to analyze pertinent themes in the retrieved articles.
Findings
G-IoT is an overlooked dimension in construction and smart cities so far. Thirty-three scholarly articles were reviewed from a total of 82 articles retrieved, from which five themes were identified: G-IoT in buildings, computing, sustainability, waste management and tracking and monitoring. Among other applications, findings show that G-IoT is prominent in smart urban services, healthcare, traffic management, green computing, environmental protection, site safety and waste management. Applicable strategies to hasten adoption include raising awareness, financial incentives, dedicated work approaches, G-IoT technologies and purposeful capacity building among stakeholders. The future of G-IoT in construction and smart city research is in smart drones, building information modeling, digital twins, 3D printing, green computing, robotics and policies that incentivize adoption.
Originality/value
This study adds to the normative literature on envisioning potential strategies for adoption and the future of G-IoT in construction and smart cities as an overlooked dimension. No previous study to date has reviewed pertinent literature in this area, intending to investigate the current applications, adoption strategies and future direction of G-IoT in construction and smart cities. Researchers can expand on the current study by exploring the identified G-IoT applications and adoption strategies in detail, and practitioners can develop implementation policies, regulations and guidelines for holistic G-IoT adoption.
Details
Keywords
Tinna Dögg Sigurdardóttir, Adrian West and Gisli Hannes Gudjonsson
This study aims to examine the scope and contribution of Forensic Clinical Psychology (FCP) advice from the National Crime Agency (NCA) to criminal investigations in the UK to…
Abstract
Purpose
This study aims to examine the scope and contribution of Forensic Clinical Psychology (FCP) advice from the National Crime Agency (NCA) to criminal investigations in the UK to address the gap in current knowledge and research.
Design/methodology/approach
The 36 FCP reports reviewed were written between 2017 and 2021. They were analysed using Toulmin’s (1958) application of pertinent arguments to the evaluation process. The potential utility of the reports was analysed in terms of the advice provided.
Findings
Most of the reports involved murder and equivocal death. The reports focused primarily on understanding the offender’s psychopathology, actions, motivation and risk to self and others using a practitioner model of case study methodology. Out of the 539 claims, grounds were provided for 99% of the claims, 91% had designated modality, 62% of the claims were potentially verifiable and 57% of the claims were supported by a warrant and/or backing. Most of the reports provided either moderate or high insight into the offence/offender (92%) and potential for new leads (64%).
Practical implications
The advice provided relied heavily on extensive forensic clinical and investigative experience of offenders, guided by theory and research and was often performed under considerable time pressure. Flexibility, impartiality, rigour and resilience are essential prerequisites for this type of work.
Originality/value
To the best of the authors’ knowledge, this study is the first to systematically evaluate forensic clinical psychology reports from the NCA. It shows the pragmatic, dynamic and varied nature of FCP contributions to investigations and its potential utility.
Details
Keywords
Leiming Geng, Ruihua Zhang and Weihua Liu
It is an indispensable part of airworthiness certification to evaluate the fuel tank flammability exposure time for transport aircraft. There are many factors and complex coupling…
Abstract
Purpose
It is an indispensable part of airworthiness certification to evaluate the fuel tank flammability exposure time for transport aircraft. There are many factors and complex coupling relationships affecting the fuel tank flammability exposure time. The current work not only lacks a comprehensive analysis of these factors but also lacks the significance of each factor, the interaction relationship and the prediction method of flammability exposure time. The lack of research in these aspects seriously restricts the smooth development of the airworthiness forensics work of domestic large aircraft. This paper aims to clarify the internal relationship between user input parameters and predict the flammability exposure time of fuel tanks for transport aircraft.
Design/methodology/approach
Based on the requirements of airworthiness certification for large aircraft, an in-depth analysis of the Monte Carlo flammability evaluation source procedures specified in China Civil Aviation Regulation/FAR25 airworthiness regulations was made, the internal relationship between factors affecting the fuel tank flammability exposure time was clarified and the significant effects and interactions of input parameters in the Monte Carlo evaluation model were studied using the response surface method. And the BP artificial neural network training samples with high significance factors were used to establish the prediction model of flammability exposure time.
Findings
The input parameters in the Monte Carlo program directly or indirectly affect the fuel tank flammability exposure time by means of the influence on the flammability limit or fuel temperature. Among the factors affecting flammability exposure time, the cruising Mach number, balance temperature difference and maximum range are the most significant, and they are all positively correlated with flammability exposure time. Although there are interactions among all factors, the degree of influence on flammability exposure time is not the same. The interaction between maximum range and equilibrium temperature difference is more significant than other factors. The prediction model of flammability exposure time based on multifactor interaction and BP neural network has good accuracy and can be applied to the prediction of fuel tank flammability exposure time.
Originality/value
The flammability exposure time prediction model was established based on multifactor interaction and BP neural network. The limited test results were combined with intelligent algorithm to achieve rapid prediction, which saved the test cost and time.
Details
Keywords
Călin Mihail Rangu, Leonardo Badea, Mircea Constantin Scheau, Larisa Găbudeanu, Iulian Panait and Valentin Radu
In recent years, the frequency and severity of cybersecurity incidents have prompted customers to seek out specialized insurance products. However, this has also presented…
Abstract
Purpose
In recent years, the frequency and severity of cybersecurity incidents have prompted customers to seek out specialized insurance products. However, this has also presented insurers with operational challenges and increased costs. The assessment of risks for health systems and cyber–physical systems (CPS) necessitates a heightened degree of attention. The significant values of potential damages and claims request a solid insurance system, part of cyber-resilience. This research paper focuses on the emerging cyber insurance market that is currently in the process of standardizing and improving its risk analysis concerning the potential insured entity.
Design/methodology/approach
The authors' approach involves a quantitative analysis utilizing a Likert-style questionnaire designed to survey cyber insurance professionals. The authors' aim is to identify the current methods used in gathering information from potential clients, as well as the manner in which this information is analyzed by the insurers. Additionally, the authors gather insights on potential improvements that could be made to this process.
Findings
The study the authors elaborated it has a particularly important cyber and risk components for insurance area, because it addresses a “niche” area not yet proper addressed in specialized literature – cyber insurance. Cyber risk management approaches are not uniform at the international level, nor at the insurer level. Also, not all insurers can perform solid assessments, especially since their companies should first prove that they are fully compliant with international cyber security standards.
Research limitations/implications
This research has concentrated on analyzing the current practices in terms of gathering information about the insured entity before issuing the cyber insurance policy, level of details concerning the cyber security posture of the insured entity and way such information should be analyzed in a standardized and useful manner. The novelty of this research resides in the analysis performed as detailed above and the proposals in terms of information gathered, depth of analysis and standardization of approach made. Future work on the topic can focus on the standardization process for analyzing cyber risk for insurance clients, to improve the proposal based also on historical elements and trends in the market. Thus, future research can further refine the standardization process to analyze in more depth the way this can be implemented and included in relevant legislation at the EU level.
Practical implications
Proposed improvements include proposals in terms of the level of detail and the usefulness of an independent centralized approach for information gathering and analysis, especially given the re-insurance and brokerage activities. The authors also propose a common practical procedural approach in risk management, with the involvement of insurance companies and certification institutions of cyber security auditors.
Originality/value
The study investigates the information gathered by insurers from potential clients of cyber insurance and the way this is analyzed and updated for issuance of the insurance policy.
Details
Keywords
Benford's Law is an empirical observation about the frequency of digits in a variety of naturally occurring data sets. Auditors and forensic scientists have used Benford's Law to…
Abstract
Benford's Law is an empirical observation about the frequency of digits in a variety of naturally occurring data sets. Auditors and forensic scientists have used Benford's Law to detect erroneous data in accounting and legal usage. One well-known limitation is that Benford's Law fails when data have clear minimum and maximum values. Many kinds of education data, including assessment scores, typically include hard maximums and therefore do not meet the parametric assumptions of Benford's Law. This paper implements a transformation procedure which allows for assessment data to be compared to Benford's Law. As a case study, a data quality assessment of oral language scores from the Early Childhood Longitudinal Study, Kindergarten (ECLS-K) study is used and higher risk data segments detected. The same method could be used to evaluate other concerns, such as test fraud, or other bounded datasets.
Details
Keywords
Junseon Jeong, Minji Park, Hyeonah Jo, Chunju Kim and Ji Hoon Song
This study identifies the policing pre-deployment training content for Korean experts based on needs assessments. Korean policing is at an excellent level to transfer knowledge…
Abstract
Purpose
This study identifies the policing pre-deployment training content for Korean experts based on needs assessments. Korean policing is at an excellent level to transfer knowledge and skills. Pre-deployment training should be designed systematically and training of trainers approaches should be implemented.
Design/methodology/approach
This study used T-tests, Borich needs assessments, and Locus for Focus model analyses to determine the priorities of needs for pre-deployment training in policing. A survey of 116 experienced experts was conducted, with 87 responding (75%).
Findings
The study identified 26 factors that deployed law enforcement professionals want to learn from pre-deployment training. These factors were categorized into three areas: research, training design and methods and understanding of partner countries and international development cooperation. The nine highest priorities for training needs were related to understanding the status and conditions of police training in the country to which policing experts are deployed.
Research limitations/implications
This study was limited to Korean policing experts. And the study did not evaluate the validity of the training curriculum or indicators.
Practical implications
Technical assistance in international policing development cooperation aims to train future trainers who can train local police. This study found that limited learner information and poor communication skills can lead to ineffective technical assistance.
Originality/value
This study highlights the importance of knowledge transfer and effective pre-deployment training for policing. The findings can be used to improve training programs and police human resource development.
Details
Keywords
Gunnar Lindqvist and Joakim Kävrestad
The purpose of this paper is to identify whether there is a lower willingness to report a crime if a victim must hand in their mobile phone as evidence. If that is the case, the…
Abstract
Purpose
The purpose of this paper is to identify whether there is a lower willingness to report a crime if a victim must hand in their mobile phone as evidence. If that is the case, the research seeks to examine whether privacy concerns and lower willingness correlate with one another and thereby investigate whether privacy concerns could lead to fewer crimes being reported and resolved.
Design/methodology/approach
A mobile phone survey was distributed to 400 Swedish adults to identify their hypothetical willingness to report certain crimes with and without handing in their mobile phones as evidence. The results were then analysed using inferential statistics.
Findings
The result suggests that there is no meaningful correlation between privacy attitudes and willingness to report crime when the handover of a mobile phone is necessary. The results of this study however show a significant lower willingness to report crimes when the mobile phone must be handed in.
Research limitations/implications
Because the chosen target group were Swedish adults, the research results may lack generalisability for other demographics. Therefore, researchers are encouraged to test other demographics.
Originality/value
This paper’s contribution is the novel exploration of attitudes and behaviours regarding the combination of privacy, digital forensics, mobile phones and crime reportage. This research effort examined the problematic situation that can arise for victims of crime, the invasion of privacy when providing evidence by handing in a mobile phone to the police’s forensic unit for examination.
Details
Keywords
Haitham Nobanee, Ahmad Yuosef Alodat, Mehroz Nida Dilshad, Alaa El Sayah, Sondos Nezam Alas’ad, Baraa Omar Al Shalabi, Sara Fadel Alsadi, Noora Mohammed Al Marri and Farzin Kamal Fiza
This study aims to examine the research output on cyber insurance from 2002 to 2021 through an extensive bibliometric analysis. It examines the cyber insurance resources and how…
Abstract
Purpose
This study aims to examine the research output on cyber insurance from 2002 to 2021 through an extensive bibliometric analysis. It examines the cyber insurance resources and how the process of cyber insurance works.
Design/methodology/approach
This paper uses Scopus and VOSviewer to analyze cyber insurance papers. Using 503 papers from Scopus, this paper enhances the understanding of cyber insurance through collaborative network maps of experts and researchers.
Findings
The study comprehensively evaluates the development of cyber research. The results show that the number of research articles on cyber insurance has significantly increased since 2009.
Practical implications
The study's results offer practical implications for researchers to gain knowledge on the latest trends and developments in the domain. In addition, the study highlights the significance of cyber insurance in mitigating financial risks linked to cyberattacks, potentially boosting the investment of more organizations in such policies. Furthermore, practitioners can enhance their understanding of the various types of cyber insurance policies and their coverage.
Originality/value
Our results are likely to encourage practitioners, computer scientists, auditors, accountants and lawyers to contribute further to corporate strategies, data analytics and business operations to mitigate cyber risk consequences. In addition, understanding regarding the cyber insurance concept formed between experts and researchers is limited. This paper fills this gap by evaluating and identifying the development of cyber insurance literature.
Details