Search results

1 – 10 of over 31000
Article
Publication date: 4 June 2019

Hardius Usman, Nurdin Sobari and Lia Estika Sari

This study aims to identify the terminology that is in accordance with the reality of Muslim tourism market, especially from the perspective of Sharia motivation, between Halal…

Abstract

Purpose

This study aims to identify the terminology that is in accordance with the reality of Muslim tourism market, especially from the perspective of Sharia motivation, between Halal tourism and Islamic tourism; provide information on the special needs of Muslim travelers based on the dominant motivational differences; and find the impact of Sharia motivation and the special needs of Muslim tourists to their satisfaction.

Design/methodology/approach

The target population in this study is Muslim traveler at least 18 years old who has been traveling throughout Indonesia. Paired sample t-Test, multivariate analysis of variance and the multiple linier regression are applied for data analysis.

Findings

This study finds that Sharia motivation is less dominant in encouraging Muslims to travel; Sharia motivation has no impact on the importance of Sharia transportation, generic transportation and generic activities; and the dominance of Sharia motivation does not affect Muslim tourist satisfaction. However, the dominance of Sharia motivation has an influence on the importance of Sharia accommodation and Sharia activities, where both variables have positive effect on satisfaction. In the end, this study concludes that it is better to use the concept of Halal tourism than Islamic tourism.

Originality/value

This paper investigates the term of Halal tourism and Islamic tourism that are still ambiguous; even some researchers consider that the definition of both is similar.

Details

Journal of Islamic Marketing, vol. 10 no. 3
Type: Research Article
ISSN: 1759-0833

Keywords

Article
Publication date: 31 August 2012

Xin Hong, Chris D. Nugent, Maurice D. Mulvenna, Suzanne Martin, Steven Devlin and Jonathan G. Wallace

Within smart homes, ambient sensors are used to monitor interactions between users and the home environment. The data produced from the sensors are used as the basis for the…

Abstract

Purpose

Within smart homes, ambient sensors are used to monitor interactions between users and the home environment. The data produced from the sensors are used as the basis for the inference of the users' behaviour information. Partitioning sensor data in response to individual instances of activity is critical for a smart home to be fully functional and to fulfil its roles, such as correctly measuring health status and detecting emergency situations. The purpose of this study is to propose a similarity‐based segmentation approach applied on time series sensor data in an effort to detect and recognise activities within a smart home.

Design/methodology/approach

The paper explores methods for analysing time‐related sensor activation events in an effort to undercover hidden activity events through the use of generic sensor modelling of activity based upon the general knowledge of the activities. Two similarity measures are proposed to compare a time series based sensor sequence and a generic sensor model of an activity. In addition, a framework is developed for automatically analysing sensor streams.

Findings

The results from evaluation of the proposed methodology on a publicly accessible reference dataset show that the proposed methods can detect and recognise multi‐category activities with satisfying accuracy, in addition to the capability of detecting interleaved activities.

Originality/value

The concepts introduced in this paper will improve automatic detection and recognition of daily living activities from timely ordered sensor events based on domain knowledge of the activities.

Details

International Journal of Pervasive Computing and Communications, vol. 8 no. 3
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 19 July 2013

Gregor Zellner

Business process redesign (BPR) is still a big issue in improving organizations and a lot of methods and techniques exist to support this undertaking. Referring to this, the…

2397

Abstract

Purpose

Business process redesign (BPR) is still a big issue in improving organizations and a lot of methods and techniques exist to support this undertaking. Referring to this, the purpose of this paper is to derive a framework for identifying patterns in BPR that help in discovering new mechanisms which are indispensable to redesign and improve business processes.

Design/methodology/approach

The first part of this research process follows the principles of design science research by deriving the framework as an artifact. The second part focuses on the justification (“Justify/Evaluate”) of the framework using a literature review and a laboratory experiment.

Findings

A framework for identifying BPR pattern is derived and in parts validated by literature that helps to support the act of improving business processes. The advantages of this approach lie in the integrity of deriving possible patterns and the fact that it is not limited (as attempts in related work suffered from). The practical implications and added value of the (selected) patterns could be validated by conducting a laboratory experiment.

Research limitations/implications

The justification of the framework is based on a narrow literature review, just to show that this framework is applicable. For a more detailed evaluation a broader literature review is needed. The laboratory experiment was conducted for four patterns only. This also needs to be expanded in further research.

Practical implications

The paper is valuable for academics and practitioners because the impact of BPR on organizational performance is high. Using the identified BPR pattern facilitates the redesign of business processes, as shown in the experiment.

Originality/value

The originality of the paper lies in the possibility to easily identify BPR pattern to support the redesign of existing business processes.

Article
Publication date: 1 April 1989

G.J. Colquhoun, J.D. Gamble and R.W. Baines

International competition is driving manufacturing executives toplace an ever‐growing importance on the formulation of computerintegrated manufacturing (CIM) strategies as part of…

Abstract

International competition is driving manufacturing executives to place an ever‐growing importance on the formulation of computer integrated manufacturing (CIM) strategies as part of their corporate plans. Structured analysis and design techniques, in particular IDEF (Integrated Computer Aided Manufacturing definition method), are becoming a vital tool in the analysis and implementation of such CIM strategies. This article positively demonstrates the technique and its ability to model the link between design and manufacture in a CIM environment. The approach relates interdependencies of planning for manufacture, design and process planning within a CIM strategy. In particular it establishes the position of computer aided process planning (CAPP) in CIM architecture and evaluates a CAPP package as a potential element of a CIM strategy. The application to which IDEFo, in particular, has been used clearly demonstrates its usefulness to manufacturers as a powerful aid to the development of detailed CIM strategies.

Details

International Journal of Operations & Production Management, vol. 9 no. 4
Type: Research Article
ISSN: 0144-3577

Keywords

Book part
Publication date: 8 July 2015

Benjamin Cornwell and Kate Watkins

The ability to analyze social action as it unfolds on micro time scales – particularly the 24-hour day – is central to understanding group processes. This chapter describes a new…

Abstract

Purpose

The ability to analyze social action as it unfolds on micro time scales – particularly the 24-hour day – is central to understanding group processes. This chapter describes a new approach to this undertaking, which treats individuals’ involvement in specific activities at specific times as bases for: (1) sequential linkages between activities; as well as (2) connections to others who engage in similar action sequences. This makes it possible to examine the emergence and internal functioning of groups using existing network analysis techniques.

Methodology/approach

We illustrate this approach with a specific application – a quantitative and visual comparison of the daily activity patterns of employed and unemployed people. We use data from 13,310 24-hour time diaries from the 2010–2013 American Time Use Surveys.

Findings

Employed and unemployed people engage in significantly different types of activities and at different times. Beyond this, network analyses reveal that unemployed individuals experience much lower levels of synchrony with each other than do employed individuals and have much less organized action sequences. In short, there is a chronic lack of prevailing norms regarding how unemployed people organize the 24-hour day.

Research implications

Future research that uses time-stamped data can employ network methods to analyze and visualize how group members sequence and synchronize social action. These methods make it possible to study how the structure of social action shapes group and individual-level outcomes.

Details

Advances in Group Processes
Type: Book
ISBN: 978-1-78560-076-0

Keywords

Article
Publication date: 10 April 2007

Norman T. Sheehan and Nicolai J. Foss

Almost since the inception of the resource‐based view (RBV), critics have complained that the view is weak in the prescriptive dimension. A recent statement of this critique is by…

7196

Abstract

Purpose

Almost since the inception of the resource‐based view (RBV), critics have complained that the view is weak in the prescriptive dimension. A recent statement of this critique is by Priem and Butler, who argue that the RBV does not address value creation. One aspect of this is that the link between resources and value creation is black‐boxed. The paper aims to argue that a Porterian activity analysis with a focus on activity drivers can remedy this weakness, and how it brings into focus important implementation issues that are neglected in the RBV.

Design/methodology/approach

The study extends Priem and Butler's critique of the RBV by examining the RBV literature in light of Porter's activity‐based framework.

Findings

The resource‐based logic has been gainfully applied in many fields other than strategy. However, because it lacks the concept of activities, the paper argues that it has not reached its full potential in the field of strategy. Formally including the concept of activities and activity drivers addresses the prescriptive shortcomings of the RBV.

Practical implications

Porter's activity drivers are “levers” that managers can manipulate to improve firm value creation in two ways: The first method involves using activity drivers to improve the efficiency and effectiveness of individual activities. The second method involves improving the fit at the level of the firm's activity set. Managers may identify potentially rewarding competitive positions and then use competitive data regarding rivals' activities and drivers to gauge how successful their firm may be in capturing these positions.

Originality/value

This is one of the first attempts to address the prescriptive shortcomings of the RBV using a Porterian activity lens.

Details

Management Decision, vol. 45 no. 3
Type: Research Article
ISSN: 0025-1747

Keywords

Article
Publication date: 1 September 1999

Richard Dwight

Performance measurement remains a complex issue. This is particularly so if some absolute measure of performance is sought. A definition of performance in terms of value is…

1707

Abstract

Performance measurement remains a complex issue. This is particularly so if some absolute measure of performance is sought. A definition of performance in terms of value is restated and further developed. Reacting to this strict definition, the systems audit approach to measuring performance is developed and its use illustrated. Concludes that the absolute definition of maintenance performance, in terms of changes in value, presents difficult practical problems. Notes that a systems audit approach to performance measurement can potentially overcome some of these problems while preserving the focus on both business outcomes.

Details

Journal of Quality in Maintenance Engineering, vol. 5 no. 3
Type: Research Article
ISSN: 1355-2511

Keywords

Article
Publication date: 20 July 2022

Jana Brockhaus, Alexander Buhmann and Ansgar Zerfass

This article studies the digitalization of corporate communications and the emergence of communication technology (CommTech). The authors show communicators' expectations…

1675

Abstract

Purpose

This article studies the digitalization of corporate communications and the emergence of communication technology (CommTech). The authors show communicators' expectations regarding digitalization, gauge the current level of digitalization across communication departments and agencies and examine the effectiveness of strategic approaches to manage digitalization.

Design/methodology/approach

The authors conceptualize the phenomenon of CommTech and propose a framework for studying CommTech's emergence and consequences by combining (1) recent theorizing on digitalization in corporate communications, (2) the concept of digital maturity from information systems research and (3) a socio-technical approach to analyze the development of work systems. The authors apply this framework in a quantitative study (n = 2,664) among communication practitioners from 46 countries.

Findings

While digitalization of both communication activities and the underlying support infrastructure is seen as critically important among communicators, a large fraction of communication departments and agencies are still assessed as digitally immature. Further, data reveal the relevance of different (technology, tasks, structure and people) dimensions of digitalization strategies and the influence of such strategies on the digital maturity of communications.

Practical implications

The framework and empirical instruments developed in this study help practitioners to uncover and evaluate the level of digital maturity of communication departments and agencies. This allows to identify current challenges and future opportunities for improvement.

Originality/value

The authors propose a concise definition for the much-debated concept of CommTech and develop a new theoretical framework for understanding CommTech's emergence and consequences in the profession. This empirical work constitutes the first large-scale study on the digital maturity of communication departments and agencies.

Details

Corporate Communications: An International Journal, vol. 28 no. 2
Type: Research Article
ISSN: 1356-3289

Keywords

Article
Publication date: 13 July 2015

Muhammad Adnan, Mike Just, Lynne Baillie and Hilmi Gunes Kayacik

– The purpose of this paper is to investigate the work practices of network security professionals and to propose a new and robust work practices model of these professionals.

Abstract

Purpose

The purpose of this paper is to investigate the work practices of network security professionals and to propose a new and robust work practices model of these professionals.

Design/methodology/approach

The proposed work practices model is composed by combining the findings of ten notable empirical studies performed so far this century. The proposed model was then validated by an online survey of 125 network security professionals with a wide demographic spread.

Findings

The empirical data collected from the survey of network security professionals strongly validate the proposed work practices model. The results also highlight interesting trends for different groups of network security professionals, with respect to performing different security-related activities.

Research limitations/implications

Further studies could investigate more closely the links and dependencies between the different activities of the proposed work practices model and tools used by network security professionals to perform these activities.

Practical implications

A robust work practices model of network security professionals could hugely assist tool developers in designing usable tools for network security management.

Originality/value

This paper proposes a new work practices model of network security professionals, which is built by consolidating existing empirical evidence and validated by conducting a survey of network security professionals. The findings enhance the understanding of tool developers about the day-to-day activities of network security professionals, consequently assisting developers in designing better tools for network security management.

Details

Information & Computer Security, vol. 23 no. 3
Type: Research Article
ISSN: 2056-4961

Keywords

1 – 10 of over 31000