Search results

1 – 5 of 5
Open Access
Article
Publication date: 6 June 2018

Jaafar EL Bakkali, Hamid Mansouri and Abderrahim Doudouh

In this work, a user-friendly Java-based open-source software has been developed for internal radiation dosimetry. Based on values published by the International Commission on…

Abstract

In this work, a user-friendly Java-based open-source software has been developed for internal radiation dosimetry. Based on values published by the International Commission on Radiological Protection (ICRP), the software calculates the estimated absorbed dose for each organ and also the estimated effective dose, this for about forty of the most known radioactive drugs. In addition, the present software offers many features which include: 1) a very friendly graphical user-interface (GUI) designed to facilitate the process of selecting mandatory input data such as radiopharmaceutical product, administered activity and patient's data, 2) a tool for generating a medical report, which can be exported as PDF file or printed directly and then incorporated into the patient's record, 3) a SQLite database for storing patient's specific and dosimetric data. We believe that the present software can be a useful tool for nuclear medicine workers. It is freely available for download on GitHub (https://github.com/EL-Bakkali-Jaafar/RadioPharmaDose).

Details

Applied Computing and Informatics, vol. 16 no. 1/2
Type: Research Article
ISSN: 2634-1964

Keywords

Open Access
Article
Publication date: 5 December 2023

Bargavi Ravichandran and Kavitha Shanmugam

This conceptual study investigates the adoption of education technology (EdTech) products among college students, focusing on identifying the key factors influencing the adoption…

Abstract

Purpose

This conceptual study investigates the adoption of education technology (EdTech) products among college students, focusing on identifying the key factors influencing the adoption process within educational institutions. Technology integration in education has rapidly gained prominence, with EdTech offering innovative solutions to enhance teaching and learning experiences. However, understanding the determinants that affect EdTech adoption remains critical for its successful implementation and impact. This paper aims (1) to identify the factors influencing the adoption of EdTech by college students (2) to create a conceptual model that shows the connections between the elements that lead to college students adopting EdTech.

Design/methodology/approach

The research employed a mixed-methods approach, combining qualitative data analysis and conceptual modeling to achieve the objectives. The underlying knowledge required to create a qualitative data gathering tool was obtained through a thorough literature analysis on innovation dissemination, educational psychology and technology adoption. College students, teachers and administrators participated in semi-structured interviews, focus groups and surveys to provide detailed perspectives on their attitudes about and experiences with EdTech. The Scopus and Web of Science databases are searched for relevant information in an organized manner in order to determine the factors influencing the adoption of EdTech. Second, an extended version of the technology adoption model is adopted to develop a qualitative data-based conceptual framework to analyze EdTech adoption in the Indian context.

Findings

Overall, by highlighting the critical components that emotionally influence college students' adoption of EdTech products in educational institutions, this course adds to the body of information already in existence. The conceptual framework model serves as a roadmap for educational stakeholders seeking to leverage EdTech effectively to enrich the learning environment and improve educational outcomes. By recognizing the significance of the identified factors, academic institutions can make informed decisions to foster a climate conducive to successful EdTech integration.

Research limitations/implications

A comprehensive conceptual framework model was developed based on qualitative data analysis to illustrate the interrelationships between the identified factors influencing EdTech adoption. This model presents a valuable tool for educational institutions, policymakers and EdTech developers to comprehend the complex dynamics of implementing these technological solutions.

Originality/value

The findings of this study demonstrated a number of important variables that affect the uptake of EdTech products in educational settings. These factors encompassed technological infrastructure, ease of use, perceived usefulness, compatibility with existing academic practices, institutional support, financial constraints and individual attitudes towards technology. Additionally, the research explored the significance of institutional preparation for embracing technological advancements as well as the influence of socio-cultural elements.

Details

Management Matters, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2279-0187

Keywords

Open Access
Article
Publication date: 21 December 2021

Martin Karlsson, Fredrik Karlsson, Joachim Åström and Thomas Denk

This paper aims to investigate the connection between different perceived organizational cultures and information security policy compliance among white-collar workers.

4112

Abstract

Purpose

This paper aims to investigate the connection between different perceived organizational cultures and information security policy compliance among white-collar workers.

Design/methodology/approach

The survey using the Organizational Culture Assessment Instrument was sent to white-collar workers in Sweden (n = 674), asking about compliance with information security policies. The survey instrument is an operationalization of the Competing Values Framework that distinguishes between four different types of organizational culture: clan, adhocracy, market and bureaucracy.

Findings

The results indicate that organizational cultures with an internal focus are positively related to employees’ information security policy compliance. Differences in organizational culture with regards to control and flexibility seem to have less effect. The analysis shows that a bureaucratic form of organizational culture is most fruitful for fostering employees’ information security policy compliance.

Research limitations/implications

The results suggest that differences in organizational culture are important for employees’ information security policy compliance. This justifies further investigating the mechanisms linking organizational culture to information security compliance.

Practical implications

Practitioners should be aware that the different organizational cultures do matter for employees’ information security compliance. In businesses and the public sector, the authors see a development toward customer orientation and marketization, i.e. the opposite an internal focus, that may have negative ramifications for the information security of organizations.

Originality/value

Few information security policy compliance studies exist on the consequences of different organizational/information cultures.

Open Access
Article
Publication date: 15 July 2020

Latifah Algabry, Syed Musa Alhabshi, Younes Soualhi and Omar Alaeddin

The main purpose of this research is to figure out the most effective determinants that play a vital role in enhancing the effectiveness of the internal Sharīʿah audit in the…

10048

Abstract

Purpose

The main purpose of this research is to figure out the most effective determinants that play a vital role in enhancing the effectiveness of the internal Sharīʿah audit in the Islamic banking industry.

Design/methodology/approach

This paper reviews the existing literature to build comprehensive knowledge that would assist in determining the main factors that impact on the effectiveness of Sharīʿah audit in Islamic banks.

Findings

This research proposes a conceptual framework of factors that impact on Sharīʿah audit effectiveness in IBs based on previously published studies. The proposed framework includes external and internal factors as well as internal Sharīʿah audit structure, process and requirements.

Practical implications

First, the regulators need to provide a detailed framework for Sharīʿah audit which covers the main requirements for effective Sharīʿah governance. Second, Islamic financial institutions (IFIs) need to pay more attention to following the Sharīʿah audit process in order to achieve the objective of effective Sharīʿah governance. Finally, the dearth of empirical research on the role and effectiveness of Sharīʿah audit in Islamic banking highlights the need to develop an appropriate methodology to enhance the study of the effectiveness of Sharīʿah governance practices.

Originality/value

The Sharīʿah ensures compliance with its rules and regulations and enhances the soundness and credibility of the Islamic finance industry. This study identifies a number of issues that require further investigation in order to establish a better system of Sharīʿah audit and to identify the factors that affect Sharīʿah auditing practices. This paper is unique in covering the main elements that have influence on the effectiveness of Sharīʿah audit and proposes them in one framework.

Details

ISRA International Journal of Islamic Finance, vol. 12 no. 2
Type: Research Article
ISSN: 0128-1976

Keywords

Open Access
Article
Publication date: 28 February 2023

Onyeka John Chukwuka, Jun Ren, Jin Wang and Dimitrios Paraskevadakis

Unforeseen events can disrupt the operational process and negatively impact emergency resources optimization and its supply chain. A limited number of studies have addressed risk…

2747

Abstract

Purpose

Unforeseen events can disrupt the operational process and negatively impact emergency resources optimization and its supply chain. A limited number of studies have addressed risk management issues in the context of emergency supply chains, and this existing research lacks inbuilt and practical techniques that can significantly affect the reliability of risk management outcomes. Therefore, this paper aims to identify and practically analyze the specific risk factors that can most likely disrupt the normal functioning of the emergency supply chain in disaster relief operations.

Design/methodology/approach

This paper has used a three-step process to investigate and evaluate risk factors associated with the emergency supply chain. First, the study conducts a comprehensive literature review to identify the risk factors. Second, the research develops a questionnaire survey to validate and classify the identified risk factors. At the end of this step, the study develops a hierarchical structure. Finally, the research investigates the weighted priority of the validated risk factors using the fuzzy-analytical hierarchy process (FAHP) methodology. Experts were required to provide subjective judgments.

Findings

This paper identified and validated 28 specific risk factors prevalent in emergency supply chains. Based on their contextual meanings, the research classified these risk factors into two main categories: internal and external risk factors; four subcategories: demand, supply, infrastructural and environmental risk factors; and 11 risk types: forecast, inventory, procurement, supplier, quality, transportation, warehousing, systems, disruption, social and political risk factors. The most significant risk factors include war and terrorism, the absence of legislative rules that can influence and support disaster relief operations, the impact of cascading disasters, limited quality of relief supplies and sanctions and constraints that can hinder stakeholder collaboration. Therefore, emergency supply chain managers should adopt appropriate strategies to mitigate these risk factors.

Research limitations/implications

This study will contribute to the general knowledge of risk management in emergency supply chains. The identified risk factors and structural hierarchy taxonomic diagram will provide a comprehensive risk database for emergency supply chains.

Practical implications

The research findings will provide comprehensive and systemic support for respective practitioners and policymakers to obtain a firm understanding of the different risk categories and specific risk factors that can impede the effective functioning of the emergency supply chain during immediate disaster relief operations. Therefore, this will inform the need for the improvement of practices in critical aspects of the emergency supply chain through the selection of logistics and supply chain strategies that can ensure the robustness and resilience of the system.

Originality/value

This research uses empirical data to identify, categorize and validate risk factors in emergency supply chains. This study contributes to the theory of supply chain risk management. The study also adopts the fuzzy-AHP technique to evaluate and prioritize these risk factors to inform practitioners and policymakers of the most significant risk factors. Furthermore, this study serves as the first phase of managing risk in emergency supply chains since it motivates future studies to empirically identify, evaluate and select effective strategies that can eliminate or minimize the effects of these risk factors.

Details

Journal of Humanitarian Logistics and Supply Chain Management, vol. 13 no. 3
Type: Research Article
ISSN: 2042-6747

Keywords

1 – 5 of 5