Search results
1 – 10 of 812Guanxiong Wang, Xiaojian Hu and Ting Wang
By introducing the mass customization service mode into the cloud logistics environment, this paper studies the joint optimization of service provider selection and customer order…
Abstract
Purpose
By introducing the mass customization service mode into the cloud logistics environment, this paper studies the joint optimization of service provider selection and customer order decoupling point (CODP) positioning based on the mass customization service mode to provide customers with more diversified and personalized service content with lower total logistics service cost.
Design/methodology/approach
This paper addresses the general process of service composition optimization based on the mass customization mode in a cloud logistics service environment and constructs a joint decision model for service provider selection and CODP positioning. In the model, the two objective functions of minimum service cost and most satisfactory delivery time are considered, and the Pareto optimal solution of the model is obtained via the NSGA-II algorithm. Then, a numerical case is used to verify the superiority of the service composition scheme based on the mass customization mode over the general scheme and to verify the significant impact of the scale effect coefficient on the optimal CODP location.
Findings
(1) Under the cloud logistics mode, the implementation of the logistics service mode based on mass customization can not only reduce the total cost of logistics services by means of the scale effect of massive orders on the cloud platform but also make more efficient use of a large number of logistics service providers gathered on the cloud platform to provide customers with more customized and diversified service content. (2) The scale effect coefficient directly affects the total cost of logistics services and significantly affects the location of the CODP. Therefore, before implementing the mass customization logistics service mode, the most reasonable clustering of orders on the cloud logistics platform is very important for the follow-up service combination.
Originality/value
The originality of this paper includes two aspects. One is to introduce the mass customization mode in the cloud logistics service environment for the first time and summarize the operation process of implementing the mass customization mode in the cloud logistics environment. Second, in order to solve the joint decision optimization model of provider selection and CODP positioning, this paper designs a method for solving a mixed-integer nonlinear programming model using a multi-layer coding genetic algorithm.
Details
Keywords
Derrick Boakye, David Sarpong, Dirk Meissner and George Ofosu
Cyber-attacks that generate technical disruptions in organisational operations and damage the reputation of organisations have become all too common in the contemporary…
Abstract
Purpose
Cyber-attacks that generate technical disruptions in organisational operations and damage the reputation of organisations have become all too common in the contemporary organisation. This paper explores the reputation repair strategies undertaken by organisations in the event of becoming victims of cyber-attacks.
Design/methodology/approach
For developing the authors’ contribution in the context of the Internet service providers' industry, the authors draw on a qualitative case study of TalkTalk, a British telecommunications company providing business to business (B2B) and business to customer (B2C) Internet services, which was a victim of a “significant and sustained” cyber-attack in October 2015. Data for the enquiry is sourced from publicly available archival documents such as newspaper articles, press releases, podcasts and parliamentary hearings on the TalkTalk cyber-attack.
Findings
The findings suggest a dynamic interplay of technical and rhetorical responses in dealing with cyber-attacks. This plays out in the form of marshalling communication and mortification techniques, bolstering image and riding on leader reputation, which serially combine to strategically orchestrate reputational repair and stigma erasure in the event of a cyber-attack.
Originality/value
Analysing a prototypical case of an organisation in dire straits following a cyber-attack, the paper provides a systematic characterisation of the setting-in-motion of strategic responses to manage, revamp and ameliorate damaged reputation during cyber-attacks, which tend to negatively shape the evaluative perceptions of the organisation's salient audience.
Details
Keywords
Atul Kumar Singh and V.R.Prasath Kumar
Implementing blockchain in sustainable development goals (SDGs) and environmental, social and governance (ESG)-aligned infrastructure development involves intricate strategic…
Abstract
Purpose
Implementing blockchain in sustainable development goals (SDGs) and environmental, social and governance (ESG)-aligned infrastructure development involves intricate strategic factors. Despite technological advancements, a significant research gap persists, particularly in emerging economies. This study aims to address the challenges related to SDGs and ESG objectives during infrastructure delivery remain problematic, identifying and evaluating critical strategic factors for successful blockchain implementation.
Design/methodology/approach
This study employs a three-stage methodology. Initially, 13 strategic factors are identified through a literature review and validated by conducting semi-structured interviews with six experts. In the second stage, the data were collected from nine additional experts. In the final stage, the collected data undergoes analysis using interpretive structural modeling (ISM)–cross-impact matrix multiplication applied to classification (MICMAC), aiming to identify and evaluate the independent and dependent powers of strategic factors driving blockchain implementation in infrastructure development for SDGs and ESG objectives.
Findings
The study’s findings highlight three significant independent factors crucial for successfully integrating blockchain technology (BT) into infrastructure development for SDGs and ESG goals: data security (F4), identity management (F8) and supply chain management (F7). The study unravels these factors, hierarchical relationships and dependencies by applying the MICMAC and ISM techniques, emphasizing their interconnectedness.
Originality/value
This study highlights critical strategic factors for successful blockchain integration in SDG and ESG-aligned infrastructure development, offering insights for policymakers and practitioners while emphasizing the importance of training and infrastructure support in advancing sustainable practices.
Details
Keywords
This study aims to discern medieval information literacy (IL) practices through scrutiny of medieval manuscripts: both the content and the “marks of usage” evident therein.
Abstract
Purpose
This study aims to discern medieval information literacy (IL) practices through scrutiny of medieval manuscripts: both the content and the “marks of usage” evident therein.
Design/methodology/approach
Analysis of the writing of scribes. Engagement with selected primary texts (manuscripts) and prior scholarly investigations.
Findings
Ample evidence exists of the practice of IL in the medieval era, and how it was transmitted and negotiated across time and space. Popular guides for scholars, including Hugh of St. Victor's Didascalicon, and the marks of usage left on manuscripts by readers/scribes, are evidence of how members of scholarly communities engaged in collaborative metacognitive work, helping each other with tasks such as understanding the ordinatio (organisation) of texts; cross-referencing; locating information; and making judgments about relevance, amongst others. New practices were stimulated by key historical transitions, particularly the shift from ecclesiastical to secular settings for learning.
Research limitations/implications
This is a preliminary study only, intended to lay foundations and suggest directions for more detailed future investigations of primary texts. The scope is Eurocentric, and similar work might be undertaken with the records of practice available elsewhere, e.g. the Arab world, South and East Asia.
Originality/value
Some previous work (e.g. Long, 2017) has investigated medieval scholarly communities by retrospectively applying notions from practice theory, but no prior work has specifically focused upon IL as the practice under investigation.
Details
Keywords
The existing literature has been mainly focused on local problems but without an overall framework for studying the top-level planning of intelligent construction from a…
Abstract
Purpose
The existing literature has been mainly focused on local problems but without an overall framework for studying the top-level planning of intelligent construction from a systematic perspective. The purpose of this paper is to fill this gap.
Design/methodology/approach
This research adopts a deductive research approach.
Findings
This research proposes a reference architecture and related business scenario framework for intelligent construction based on the existing theory and industrial practice.
Originality/value
The main contribution of this research is to provide a useful reference to the Chinese government and industry for formulating digital transformation strategies, as well as suggests meaningful future research directions in the construction industry.
Details
Keywords
Shiyi Wang, Abhijeet Ghadge and Emel Aktas
Digital transformation using Industry 4.0 technologies can address various challenges in food supply chains (FSCs). However, the integration of emerging technologies to achieve…
Abstract
Purpose
Digital transformation using Industry 4.0 technologies can address various challenges in food supply chains (FSCs). However, the integration of emerging technologies to achieve digital transformation in FSCs is unclear. This study aims to establish how the digital transformation of FSCs can be achieved by adopting key technologies such as the Internet of Things (IoTs), cloud computing (CC) and big data analytics (BDA).
Design/methodology/approach
A systematic literature review (SLR) resulted in 57 articles from 2008 to 2022. Following descriptive and thematic analysis, a conceptual framework based on the diffusion of innovation (DOI) theory and the context-intervention-mechanism-outcome (CIMO) logic is established, along with avenues for future research.
Findings
The combination of DOI theory and CIMO logic provides the theoretical foundation for linking the general innovation process to the digital transformation process. A novel conceptual framework for achieving digital transformation in FSCs is developed from the initiation to implementation phases. Objectives and principles for digitally transforming FSCs are identified for the initiation phase. A four-layer technology implementation architecture is developed for the implementation phase, facilitating multiple applications for FSC digital transformation.
Originality/value
The study contributes to the development of theory on digital transformation in FSCs and offers managerial guidelines for accelerating the growth of the food industry using key Industry 4.0 emerging technologies. The proposed framework brings clarity into the “neglected” intermediate stage of data management between data collection and analysis. The study highlights the need for a balanced integration of IoT, CC and BDA as key Industry 4.0 technologies to achieve digital transformation successfully.
Details
Keywords
Yunis Ali Ahmed, Hafiz Muhammad Faisal Shehzad, Muhammad Mahboob Khurshid, Omayma Husain Abbas Hassan, Samah Abdelsalam Abdalla and Nashat Alrefai
Building information modelling (BIM) has transformed the traditional practices of the Architecture, Engineering and Construction (AEC) industry. BIM creates a collaborative…
Abstract
Purpose
Building information modelling (BIM) has transformed the traditional practices of the Architecture, Engineering and Construction (AEC) industry. BIM creates a collaborative digital representation of built environment data. Competitive advantage can be achieved with collaborative project delivery and rich information modelling. Despite the abundant benefits, BIM’s adoption in the AEC is susceptible to confrontation. A substantial impediment to BIM adoption often cited is data interoperability. Other facets of interoperability got limited attention. Other academic areas, including information systems, discuss the interoperability construct ahead of data interoperability. These interoperability factors have yet to be surveyed in the AEC industry. This study aims to investigate the effect of interoperability factors on BIM adoption and develop a comprehensive BIM adoption model.
Design/methodology/approach
The theoretical foundations of the proposed model are based on the European interoperability framework (EIF) and technology, organization, environment framework (TOE). Quantitative data collection from construction firms is gathered. The model has been thoroughly examined and validated using partial least squares structural equation modelling in SmartPLS software.
Findings
The study’s findings indicate that relative advantage, top management support, government support, organizational readiness and regulation support are determinants of BIM adoption. Financial constraints, complexity, lack of technical interoperability, semantic interoperability, organizational interoperability and uncertainty are barriers to BIM adoption. However, compatibility, competitive pressure and legal interoperability do not affect BIM adoption.
Practical implications
Finally, this study provides recommendations containing the essential technological, organizational, environmental and interoperability factors that AEC stakeholders can address to enhance BIM adoption.
Originality/value
To the best of the authors’ knowledge, this paper is one of the first studies to combine TOE and EIF in a single research model. This research provides empirical evidence for using the proposed model as a guide to promoting BIM adoption. As a result, the highlighted determinants can assist organizations in developing and executing successful policies that support BIM adoption in the AEC industry.
Details
Keywords
Muhammad Adnan Hasnain, Hassaan Malik, Muhammad Mujtaba Asad and Fahad Sherwani
The purpose of the study is to classify the radiographic images into three categories such as fillings, cavity and implant to identify dental diseases because dental disease is a…
Abstract
Purpose
The purpose of the study is to classify the radiographic images into three categories such as fillings, cavity and implant to identify dental diseases because dental disease is a very common dental health problem for all people. The detection of dental issues and the selection of the most suitable method of treatment are both determined by the results of a radiological examination. Dental x-rays provide important information about the insides of teeth and their surrounding cells, which helps dentists detect dental issues that are not immediately visible. The analysis of dental x-rays, which is typically done by dentists, is a time-consuming process that can become an error-prone technique due to the wide variations in the structure of teeth and the dentist's lack of expertise. The workload of a dental professional and the chance of misinterpretation can be decreased by the availability of such a system, which can interpret the result of an x-ray automatically.
Design/methodology/approach
This study uses deep learning (DL) models to identify dental diseases in order to tackle this issue. Four different DL models, such as ResNet-101, Xception, DenseNet-201 and EfficientNet-B0, were evaluated in order to determine which one would be the most useful for the detection of dental diseases (such as fillings, cavity and implant).
Findings
Loss and accuracy curves have been used to analyze the model. However, the EfficientNet-B0 model performed better compared to Xception, DenseNet-201 and ResNet-101. The accuracy, recall, F1-score and AUC values for this model were 98.91, 98.91, 98.74 and 99.98%, respectively. The accuracy rates for the Xception, ResNet-101 and DenseNet-201 are 96.74, 93.48 and 95.65%, respectively.
Practical implications
The present study can benefit dentists from using the DL model to more accurately diagnose dental problems.
Originality/value
This study is conducted to evaluate dental diseases using Convolutional neural network (CNN) techniques to assist dentists in selecting the most effective technique for a particular clinical condition.
Details
Keywords
Manuel Pedro Rodríguez Bolívar and Laura Alcaide Muñoz
This study aims to conduct performance and clustering analyses with the help of Digital Government Reference Library (DGRL) v16.6 database examining the role of emerging…
Abstract
Purpose
This study aims to conduct performance and clustering analyses with the help of Digital Government Reference Library (DGRL) v16.6 database examining the role of emerging technologies (ETs) in public services delivery.
Design/methodology/approach
VOSviewer and SciMAT techniques were used for clustering and mapping the use of ETs in the public services delivery. Collecting documents from the DGRL v16.6 database, the paper uses text mining analysis for identifying key terms and trends in e-Government research regarding ETs and public services.
Findings
The analysis indicates that all ETs are strongly linked to each other, except for blockchain technologies (due to its disruptive nature), which indicate that ETs can be, therefore, seen as accumulative knowledge. In addition, on the whole, findings identify four stages in the evolution of ETs and their application to public services: the “electronic administration” stage, the “technological baseline” stage, the “managerial” stage and the “disruptive technological” stage.
Practical implications
The output of the present research will help to orient policymakers in the implementation and use of ETs, evaluating the influence of these technologies on public services.
Social implications
The research helps researchers to track research trends and uncover new paths on ETs and its implementation in public services.
Originality/value
Recent research has focused on the need of implementing ETs for improving public services, which could help cities to improve the citizens’ quality of life in urban areas. This paper contributes to expanding the knowledge about ETs and its implementation in public services, identifying trends and networks in the research about these issues.
Details
Keywords
Security assurance evaluation (SAE) is a well-established approach for assessing the effectiveness of security measures in systems. However, one aspect that is often overlooked in…
Abstract
Purpose
Security assurance evaluation (SAE) is a well-established approach for assessing the effectiveness of security measures in systems. However, one aspect that is often overlooked in these evaluations is the assurance context in which they are conducted. This paper aims to explore the role of assurance context in system SAEs and proposes a conceptual model to integrate the assurance context into the evaluation process.
Design/methodology/approach
The conceptual model highlights the interrelationships between the various elements of the assurance context, including system boundaries, stakeholders, security concerns, regulatory compliance and assurance assumptions and regulatory compliance.
Findings
By introducing the proposed conceptual model, this research provides a framework for incorporating the assurance context into SAEs and offers insights into how it can influence the evaluation outcomes.
Originality/value
By delving into the concept of assurance context, this research seeks to shed light on how it influences the scope, methodologies and outcomes of assurance evaluations, ultimately enabling organizations to strengthen their system security postures and mitigate risks effectively.
Details