Search results
1 – 10 of over 31000Hardius Usman, Nurdin Sobari and Lia Estika Sari
This study aims to identify the terminology that is in accordance with the reality of Muslim tourism market, especially from the perspective of Sharia motivation, between Halal…
Abstract
Purpose
This study aims to identify the terminology that is in accordance with the reality of Muslim tourism market, especially from the perspective of Sharia motivation, between Halal tourism and Islamic tourism; provide information on the special needs of Muslim travelers based on the dominant motivational differences; and find the impact of Sharia motivation and the special needs of Muslim tourists to their satisfaction.
Design/methodology/approach
The target population in this study is Muslim traveler at least 18 years old who has been traveling throughout Indonesia. Paired sample t-Test, multivariate analysis of variance and the multiple linier regression are applied for data analysis.
Findings
This study finds that Sharia motivation is less dominant in encouraging Muslims to travel; Sharia motivation has no impact on the importance of Sharia transportation, generic transportation and generic activities; and the dominance of Sharia motivation does not affect Muslim tourist satisfaction. However, the dominance of Sharia motivation has an influence on the importance of Sharia accommodation and Sharia activities, where both variables have positive effect on satisfaction. In the end, this study concludes that it is better to use the concept of Halal tourism than Islamic tourism.
Originality/value
This paper investigates the term of Halal tourism and Islamic tourism that are still ambiguous; even some researchers consider that the definition of both is similar.
Details
Keywords
Xin Hong, Chris D. Nugent, Maurice D. Mulvenna, Suzanne Martin, Steven Devlin and Jonathan G. Wallace
Within smart homes, ambient sensors are used to monitor interactions between users and the home environment. The data produced from the sensors are used as the basis for the…
Abstract
Purpose
Within smart homes, ambient sensors are used to monitor interactions between users and the home environment. The data produced from the sensors are used as the basis for the inference of the users' behaviour information. Partitioning sensor data in response to individual instances of activity is critical for a smart home to be fully functional and to fulfil its roles, such as correctly measuring health status and detecting emergency situations. The purpose of this study is to propose a similarity‐based segmentation approach applied on time series sensor data in an effort to detect and recognise activities within a smart home.
Design/methodology/approach
The paper explores methods for analysing time‐related sensor activation events in an effort to undercover hidden activity events through the use of generic sensor modelling of activity based upon the general knowledge of the activities. Two similarity measures are proposed to compare a time series based sensor sequence and a generic sensor model of an activity. In addition, a framework is developed for automatically analysing sensor streams.
Findings
The results from evaluation of the proposed methodology on a publicly accessible reference dataset show that the proposed methods can detect and recognise multi‐category activities with satisfying accuracy, in addition to the capability of detecting interleaved activities.
Originality/value
The concepts introduced in this paper will improve automatic detection and recognition of daily living activities from timely ordered sensor events based on domain knowledge of the activities.
Details
Keywords
Business process redesign (BPR) is still a big issue in improving organizations and a lot of methods and techniques exist to support this undertaking. Referring to this, the…
Abstract
Purpose
Business process redesign (BPR) is still a big issue in improving organizations and a lot of methods and techniques exist to support this undertaking. Referring to this, the purpose of this paper is to derive a framework for identifying patterns in BPR that help in discovering new mechanisms which are indispensable to redesign and improve business processes.
Design/methodology/approach
The first part of this research process follows the principles of design science research by deriving the framework as an artifact. The second part focuses on the justification (“Justify/Evaluate”) of the framework using a literature review and a laboratory experiment.
Findings
A framework for identifying BPR pattern is derived and in parts validated by literature that helps to support the act of improving business processes. The advantages of this approach lie in the integrity of deriving possible patterns and the fact that it is not limited (as attempts in related work suffered from). The practical implications and added value of the (selected) patterns could be validated by conducting a laboratory experiment.
Research limitations/implications
The justification of the framework is based on a narrow literature review, just to show that this framework is applicable. For a more detailed evaluation a broader literature review is needed. The laboratory experiment was conducted for four patterns only. This also needs to be expanded in further research.
Practical implications
The paper is valuable for academics and practitioners because the impact of BPR on organizational performance is high. Using the identified BPR pattern facilitates the redesign of business processes, as shown in the experiment.
Originality/value
The originality of the paper lies in the possibility to easily identify BPR pattern to support the redesign of existing business processes.
Details
Keywords
G.J. Colquhoun, J.D. Gamble and R.W. Baines
International competition is driving manufacturing executives toplace an ever‐growing importance on the formulation of computerintegrated manufacturing (CIM) strategies as part of…
Abstract
International competition is driving manufacturing executives to place an ever‐growing importance on the formulation of computer integrated manufacturing (CIM) strategies as part of their corporate plans. Structured analysis and design techniques, in particular IDEF (Integrated Computer Aided Manufacturing definition method), are becoming a vital tool in the analysis and implementation of such CIM strategies. This article positively demonstrates the technique and its ability to model the link between design and manufacture in a CIM environment. The approach relates interdependencies of planning for manufacture, design and process planning within a CIM strategy. In particular it establishes the position of computer aided process planning (CAPP) in CIM architecture and evaluates a CAPP package as a potential element of a CIM strategy. The application to which IDEFo, in particular, has been used clearly demonstrates its usefulness to manufacturers as a powerful aid to the development of detailed CIM strategies.
Details
Keywords
Benjamin Cornwell and Kate Watkins
The ability to analyze social action as it unfolds on micro time scales – particularly the 24-hour day – is central to understanding group processes. This chapter describes a new…
Abstract
Purpose
The ability to analyze social action as it unfolds on micro time scales – particularly the 24-hour day – is central to understanding group processes. This chapter describes a new approach to this undertaking, which treats individuals’ involvement in specific activities at specific times as bases for: (1) sequential linkages between activities; as well as (2) connections to others who engage in similar action sequences. This makes it possible to examine the emergence and internal functioning of groups using existing network analysis techniques.
Methodology/approach
We illustrate this approach with a specific application – a quantitative and visual comparison of the daily activity patterns of employed and unemployed people. We use data from 13,310 24-hour time diaries from the 2010–2013 American Time Use Surveys.
Findings
Employed and unemployed people engage in significantly different types of activities and at different times. Beyond this, network analyses reveal that unemployed individuals experience much lower levels of synchrony with each other than do employed individuals and have much less organized action sequences. In short, there is a chronic lack of prevailing norms regarding how unemployed people organize the 24-hour day.
Research implications
Future research that uses time-stamped data can employ network methods to analyze and visualize how group members sequence and synchronize social action. These methods make it possible to study how the structure of social action shapes group and individual-level outcomes.
Details
Keywords
Norman T. Sheehan and Nicolai J. Foss
Almost since the inception of the resource‐based view (RBV), critics have complained that the view is weak in the prescriptive dimension. A recent statement of this critique is by…
Abstract
Purpose
Almost since the inception of the resource‐based view (RBV), critics have complained that the view is weak in the prescriptive dimension. A recent statement of this critique is by Priem and Butler, who argue that the RBV does not address value creation. One aspect of this is that the link between resources and value creation is black‐boxed. The paper aims to argue that a Porterian activity analysis with a focus on activity drivers can remedy this weakness, and how it brings into focus important implementation issues that are neglected in the RBV.
Design/methodology/approach
The study extends Priem and Butler's critique of the RBV by examining the RBV literature in light of Porter's activity‐based framework.
Findings
The resource‐based logic has been gainfully applied in many fields other than strategy. However, because it lacks the concept of activities, the paper argues that it has not reached its full potential in the field of strategy. Formally including the concept of activities and activity drivers addresses the prescriptive shortcomings of the RBV.
Practical implications
Porter's activity drivers are “levers” that managers can manipulate to improve firm value creation in two ways: The first method involves using activity drivers to improve the efficiency and effectiveness of individual activities. The second method involves improving the fit at the level of the firm's activity set. Managers may identify potentially rewarding competitive positions and then use competitive data regarding rivals' activities and drivers to gauge how successful their firm may be in capturing these positions.
Originality/value
This is one of the first attempts to address the prescriptive shortcomings of the RBV using a Porterian activity lens.
Details
Keywords
Performance measurement remains a complex issue. This is particularly so if some absolute measure of performance is sought. A definition of performance in terms of value is…
Abstract
Performance measurement remains a complex issue. This is particularly so if some absolute measure of performance is sought. A definition of performance in terms of value is restated and further developed. Reacting to this strict definition, the systems audit approach to measuring performance is developed and its use illustrated. Concludes that the absolute definition of maintenance performance, in terms of changes in value, presents difficult practical problems. Notes that a systems audit approach to performance measurement can potentially overcome some of these problems while preserving the focus on both business outcomes.
Details
Keywords
Jana Brockhaus, Alexander Buhmann and Ansgar Zerfass
This article studies the digitalization of corporate communications and the emergence of communication technology (CommTech). The authors show communicators' expectations…
Abstract
Purpose
This article studies the digitalization of corporate communications and the emergence of communication technology (CommTech). The authors show communicators' expectations regarding digitalization, gauge the current level of digitalization across communication departments and agencies and examine the effectiveness of strategic approaches to manage digitalization.
Design/methodology/approach
The authors conceptualize the phenomenon of CommTech and propose a framework for studying CommTech's emergence and consequences by combining (1) recent theorizing on digitalization in corporate communications, (2) the concept of digital maturity from information systems research and (3) a socio-technical approach to analyze the development of work systems. The authors apply this framework in a quantitative study (n = 2,664) among communication practitioners from 46 countries.
Findings
While digitalization of both communication activities and the underlying support infrastructure is seen as critically important among communicators, a large fraction of communication departments and agencies are still assessed as digitally immature. Further, data reveal the relevance of different (technology, tasks, structure and people) dimensions of digitalization strategies and the influence of such strategies on the digital maturity of communications.
Practical implications
The framework and empirical instruments developed in this study help practitioners to uncover and evaluate the level of digital maturity of communication departments and agencies. This allows to identify current challenges and future opportunities for improvement.
Originality/value
The authors propose a concise definition for the much-debated concept of CommTech and develop a new theoretical framework for understanding CommTech's emergence and consequences in the profession. This empirical work constitutes the first large-scale study on the digital maturity of communication departments and agencies.
Details
Keywords
Muhammad Adnan, Mike Just, Lynne Baillie and Hilmi Gunes Kayacik
– The purpose of this paper is to investigate the work practices of network security professionals and to propose a new and robust work practices model of these professionals.
Abstract
Purpose
The purpose of this paper is to investigate the work practices of network security professionals and to propose a new and robust work practices model of these professionals.
Design/methodology/approach
The proposed work practices model is composed by combining the findings of ten notable empirical studies performed so far this century. The proposed model was then validated by an online survey of 125 network security professionals with a wide demographic spread.
Findings
The empirical data collected from the survey of network security professionals strongly validate the proposed work practices model. The results also highlight interesting trends for different groups of network security professionals, with respect to performing different security-related activities.
Research limitations/implications
Further studies could investigate more closely the links and dependencies between the different activities of the proposed work practices model and tools used by network security professionals to perform these activities.
Practical implications
A robust work practices model of network security professionals could hugely assist tool developers in designing usable tools for network security management.
Originality/value
This paper proposes a new work practices model of network security professionals, which is built by consolidating existing empirical evidence and validated by conducting a survey of network security professionals. The findings enhance the understanding of tool developers about the day-to-day activities of network security professionals, consequently assisting developers in designing better tools for network security management.
Details
Keywords