Search results

1 – 10 of 812
Article
Publication date: 27 February 2023

Guanxiong Wang, Xiaojian Hu and Ting Wang

By introducing the mass customization service mode into the cloud logistics environment, this paper studies the joint optimization of service provider selection and customer order…

211

Abstract

Purpose

By introducing the mass customization service mode into the cloud logistics environment, this paper studies the joint optimization of service provider selection and customer order decoupling point (CODP) positioning based on the mass customization service mode to provide customers with more diversified and personalized service content with lower total logistics service cost.

Design/methodology/approach

This paper addresses the general process of service composition optimization based on the mass customization mode in a cloud logistics service environment and constructs a joint decision model for service provider selection and CODP positioning. In the model, the two objective functions of minimum service cost and most satisfactory delivery time are considered, and the Pareto optimal solution of the model is obtained via the NSGA-II algorithm. Then, a numerical case is used to verify the superiority of the service composition scheme based on the mass customization mode over the general scheme and to verify the significant impact of the scale effect coefficient on the optimal CODP location.

Findings

(1) Under the cloud logistics mode, the implementation of the logistics service mode based on mass customization can not only reduce the total cost of logistics services by means of the scale effect of massive orders on the cloud platform but also make more efficient use of a large number of logistics service providers gathered on the cloud platform to provide customers with more customized and diversified service content. (2) The scale effect coefficient directly affects the total cost of logistics services and significantly affects the location of the CODP. Therefore, before implementing the mass customization logistics service mode, the most reasonable clustering of orders on the cloud logistics platform is very important for the follow-up service combination.

Originality/value

The originality of this paper includes two aspects. One is to introduce the mass customization mode in the cloud logistics service environment for the first time and summarize the operation process of implementing the mass customization mode in the cloud logistics environment. Second, in order to solve the joint decision optimization model of provider selection and CODP positioning, this paper designs a method for solving a mixed-integer nonlinear programming model using a multi-layer coding genetic algorithm.

Details

Kybernetes, vol. 53 no. 4
Type: Research Article
ISSN: 0368-492X

Keywords

Article
Publication date: 26 May 2023

Derrick Boakye, David Sarpong, Dirk Meissner and George Ofosu

Cyber-attacks that generate technical disruptions in organisational operations and damage the reputation of organisations have become all too common in the contemporary…

Abstract

Purpose

Cyber-attacks that generate technical disruptions in organisational operations and damage the reputation of organisations have become all too common in the contemporary organisation. This paper explores the reputation repair strategies undertaken by organisations in the event of becoming victims of cyber-attacks.

Design/methodology/approach

For developing the authors’ contribution in the context of the Internet service providers' industry, the authors draw on a qualitative case study of TalkTalk, a British telecommunications company providing business to business (B2B) and business to customer (B2C) Internet services, which was a victim of a “significant and sustained” cyber-attack in October 2015. Data for the enquiry is sourced from publicly available archival documents such as newspaper articles, press releases, podcasts and parliamentary hearings on the TalkTalk cyber-attack.

Findings

The findings suggest a dynamic interplay of technical and rhetorical responses in dealing with cyber-attacks. This plays out in the form of marshalling communication and mortification techniques, bolstering image and riding on leader reputation, which serially combine to strategically orchestrate reputational repair and stigma erasure in the event of a cyber-attack.

Originality/value

Analysing a prototypical case of an organisation in dire straits following a cyber-attack, the paper provides a systematic characterisation of the setting-in-motion of strategic responses to manage, revamp and ameliorate damaged reputation during cyber-attacks, which tend to negatively shape the evaluative perceptions of the organisation's salient audience.

Details

Information Technology & People, vol. 37 no. 4
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 22 March 2024

Atul Kumar Singh and V.R.Prasath Kumar

Implementing blockchain in sustainable development goals (SDGs) and environmental, social and governance (ESG)-aligned infrastructure development involves intricate strategic…

Abstract

Purpose

Implementing blockchain in sustainable development goals (SDGs) and environmental, social and governance (ESG)-aligned infrastructure development involves intricate strategic factors. Despite technological advancements, a significant research gap persists, particularly in emerging economies. This study aims to address the challenges related to SDGs and ESG objectives during infrastructure delivery remain problematic, identifying and evaluating critical strategic factors for successful blockchain implementation.

Design/methodology/approach

This study employs a three-stage methodology. Initially, 13 strategic factors are identified through a literature review and validated by conducting semi-structured interviews with six experts. In the second stage, the data were collected from nine additional experts. In the final stage, the collected data undergoes analysis using interpretive structural modeling (ISM)–cross-impact matrix multiplication applied to classification (MICMAC), aiming to identify and evaluate the independent and dependent powers of strategic factors driving blockchain implementation in infrastructure development for SDGs and ESG objectives.

Findings

The study’s findings highlight three significant independent factors crucial for successfully integrating blockchain technology (BT) into infrastructure development for SDGs and ESG goals: data security (F4), identity management (F8) and supply chain management (F7). The study unravels these factors, hierarchical relationships and dependencies by applying the MICMAC and ISM techniques, emphasizing their interconnectedness.

Originality/value

This study highlights critical strategic factors for successful blockchain integration in SDG and ESG-aligned infrastructure development, offering insights for policymakers and practitioners while emphasizing the importance of training and infrastructure support in advancing sustainable practices.

Article
Publication date: 18 October 2023

Andrew Whitworth

This study aims to discern medieval information literacy (IL) practices through scrutiny of medieval manuscripts: both the content and the “marks of usage” evident therein.

Abstract

Purpose

This study aims to discern medieval information literacy (IL) practices through scrutiny of medieval manuscripts: both the content and the “marks of usage” evident therein.

Design/methodology/approach

Analysis of the writing of scribes. Engagement with selected primary texts (manuscripts) and prior scholarly investigations.

Findings

Ample evidence exists of the practice of IL in the medieval era, and how it was transmitted and negotiated across time and space. Popular guides for scholars, including Hugh of St. Victor's Didascalicon, and the marks of usage left on manuscripts by readers/scribes, are evidence of how members of scholarly communities engaged in collaborative metacognitive work, helping each other with tasks such as understanding the ordinatio (organisation) of texts; cross-referencing; locating information; and making judgments about relevance, amongst others. New practices were stimulated by key historical transitions, particularly the shift from ecclesiastical to secular settings for learning.

Research limitations/implications

This is a preliminary study only, intended to lay foundations and suggest directions for more detailed future investigations of primary texts. The scope is Eurocentric, and similar work might be undertaken with the records of practice available elsewhere, e.g. the Arab world, South and East Asia.

Originality/value

Some previous work (e.g. Long, 2017) has investigated medieval scholarly communities by retrospectively applying notions from practice theory, but no prior work has specifically focused upon IL as the practice under investigation.

Details

Journal of Documentation, vol. 80 no. 2
Type: Research Article
ISSN: 0022-0418

Keywords

Article
Publication date: 25 November 2022

Zhijia You

The existing literature has been mainly focused on local problems but without an overall framework for studying the top-level planning of intelligent construction from a…

Abstract

Purpose

The existing literature has been mainly focused on local problems but without an overall framework for studying the top-level planning of intelligent construction from a systematic perspective. The purpose of this paper is to fill this gap.

Design/methodology/approach

This research adopts a deductive research approach.

Findings

This research proposes a reference architecture and related business scenario framework for intelligent construction based on the existing theory and industrial practice.

Originality/value

The main contribution of this research is to provide a useful reference to the Chinese government and industry for formulating digital transformation strategies, as well as suggests meaningful future research directions in the construction industry.

Details

Engineering, Construction and Architectural Management, vol. 31 no. 4
Type: Research Article
ISSN: 0969-9988

Keywords

Article
Publication date: 19 January 2024

Shiyi Wang, Abhijeet Ghadge and Emel Aktas

Digital transformation using Industry 4.0 technologies can address various challenges in food supply chains (FSCs). However, the integration of emerging technologies to achieve…

Abstract

Purpose

Digital transformation using Industry 4.0 technologies can address various challenges in food supply chains (FSCs). However, the integration of emerging technologies to achieve digital transformation in FSCs is unclear. This study aims to establish how the digital transformation of FSCs can be achieved by adopting key technologies such as the Internet of Things (IoTs), cloud computing (CC) and big data analytics (BDA).

Design/methodology/approach

A systematic literature review (SLR) resulted in 57 articles from 2008 to 2022. Following descriptive and thematic analysis, a conceptual framework based on the diffusion of innovation (DOI) theory and the context-intervention-mechanism-outcome (CIMO) logic is established, along with avenues for future research.

Findings

The combination of DOI theory and CIMO logic provides the theoretical foundation for linking the general innovation process to the digital transformation process. A novel conceptual framework for achieving digital transformation in FSCs is developed from the initiation to implementation phases. Objectives and principles for digitally transforming FSCs are identified for the initiation phase. A four-layer technology implementation architecture is developed for the implementation phase, facilitating multiple applications for FSC digital transformation.

Originality/value

The study contributes to the development of theory on digital transformation in FSCs and offers managerial guidelines for accelerating the growth of the food industry using key Industry 4.0 emerging technologies. The proposed framework brings clarity into the “neglected” intermediate stage of data management between data collection and analysis. The study highlights the need for a balanced integration of IoT, CC and BDA as key Industry 4.0 technologies to achieve digital transformation successfully.

Details

Supply Chain Management: An International Journal, vol. 29 no. 2
Type: Research Article
ISSN: 1359-8546

Keywords

Article
Publication date: 13 October 2022

Yunis Ali Ahmed, Hafiz Muhammad Faisal Shehzad, Muhammad Mahboob Khurshid, Omayma Husain Abbas Hassan, Samah Abdelsalam Abdalla and Nashat Alrefai

Building information modelling (BIM) has transformed the traditional practices of the Architecture, Engineering and Construction (AEC) industry. BIM creates a collaborative…

Abstract

Purpose

Building information modelling (BIM) has transformed the traditional practices of the Architecture, Engineering and Construction (AEC) industry. BIM creates a collaborative digital representation of built environment data. Competitive advantage can be achieved with collaborative project delivery and rich information modelling. Despite the abundant benefits, BIM’s adoption in the AEC is susceptible to confrontation. A substantial impediment to BIM adoption often cited is data interoperability. Other facets of interoperability got limited attention. Other academic areas, including information systems, discuss the interoperability construct ahead of data interoperability. These interoperability factors have yet to be surveyed in the AEC industry. This study aims to investigate the effect of interoperability factors on BIM adoption and develop a comprehensive BIM adoption model.

Design/methodology/approach

The theoretical foundations of the proposed model are based on the European interoperability framework (EIF) and technology, organization, environment framework (TOE). Quantitative data collection from construction firms is gathered. The model has been thoroughly examined and validated using partial least squares structural equation modelling in SmartPLS software.

Findings

The study’s findings indicate that relative advantage, top management support, government support, organizational readiness and regulation support are determinants of BIM adoption. Financial constraints, complexity, lack of technical interoperability, semantic interoperability, organizational interoperability and uncertainty are barriers to BIM adoption. However, compatibility, competitive pressure and legal interoperability do not affect BIM adoption.

Practical implications

Finally, this study provides recommendations containing the essential technological, organizational, environmental and interoperability factors that AEC stakeholders can address to enhance BIM adoption.

Originality/value

To the best of the authors’ knowledge, this paper is one of the first studies to combine TOE and EIF in a single research model. This research provides empirical evidence for using the proposed model as a guide to promoting BIM adoption. As a result, the highlighted determinants can assist organizations in developing and executing successful policies that support BIM adoption in the AEC industry.

Details

Construction Innovation , vol. 24 no. 2
Type: Research Article
ISSN: 1471-4175

Keywords

Article
Publication date: 30 October 2023

Muhammad Adnan Hasnain, Hassaan Malik, Muhammad Mujtaba Asad and Fahad Sherwani

The purpose of the study is to classify the radiographic images into three categories such as fillings, cavity and implant to identify dental diseases because dental disease is a…

Abstract

Purpose

The purpose of the study is to classify the radiographic images into three categories such as fillings, cavity and implant to identify dental diseases because dental disease is a very common dental health problem for all people. The detection of dental issues and the selection of the most suitable method of treatment are both determined by the results of a radiological examination. Dental x-rays provide important information about the insides of teeth and their surrounding cells, which helps dentists detect dental issues that are not immediately visible. The analysis of dental x-rays, which is typically done by dentists, is a time-consuming process that can become an error-prone technique due to the wide variations in the structure of teeth and the dentist's lack of expertise. The workload of a dental professional and the chance of misinterpretation can be decreased by the availability of such a system, which can interpret the result of an x-ray automatically.

Design/methodology/approach

This study uses deep learning (DL) models to identify dental diseases in order to tackle this issue. Four different DL models, such as ResNet-101, Xception, DenseNet-201 and EfficientNet-B0, were evaluated in order to determine which one would be the most useful for the detection of dental diseases (such as fillings, cavity and implant).

Findings

Loss and accuracy curves have been used to analyze the model. However, the EfficientNet-B0 model performed better compared to Xception, DenseNet-201 and ResNet-101. The accuracy, recall, F1-score and AUC values for this model were 98.91, 98.91, 98.74 and 99.98%, respectively. The accuracy rates for the Xception, ResNet-101 and DenseNet-201 are 96.74, 93.48 and 95.65%, respectively.

Practical implications

The present study can benefit dentists from using the DL model to more accurately diagnose dental problems.

Originality/value

This study is conducted to evaluate dental diseases using Convolutional neural network (CNN) techniques to assist dentists in selecting the most effective technique for a particular clinical condition.

Details

International Journal of Intelligent Computing and Cybernetics, vol. 17 no. 1
Type: Research Article
ISSN: 1756-378X

Keywords

Open Access
Article
Publication date: 28 April 2022

Manuel Pedro Rodríguez Bolívar and Laura Alcaide Muñoz

This study aims to conduct performance and clustering analyses with the help of Digital Government Reference Library (DGRL) v16.6 database examining the role of emerging…

2190

Abstract

Purpose

This study aims to conduct performance and clustering analyses with the help of Digital Government Reference Library (DGRL) v16.6 database examining the role of emerging technologies (ETs) in public services delivery.

Design/methodology/approach

VOSviewer and SciMAT techniques were used for clustering and mapping the use of ETs in the public services delivery. Collecting documents from the DGRL v16.6 database, the paper uses text mining analysis for identifying key terms and trends in e-Government research regarding ETs and public services.

Findings

The analysis indicates that all ETs are strongly linked to each other, except for blockchain technologies (due to its disruptive nature), which indicate that ETs can be, therefore, seen as accumulative knowledge. In addition, on the whole, findings identify four stages in the evolution of ETs and their application to public services: the “electronic administration” stage, the “technological baseline” stage, the “managerial” stage and the “disruptive technological” stage.

Practical implications

The output of the present research will help to orient policymakers in the implementation and use of ETs, evaluating the influence of these technologies on public services.

Social implications

The research helps researchers to track research trends and uncover new paths on ETs and its implementation in public services.

Originality/value

Recent research has focused on the need of implementing ETs for improving public services, which could help cities to improve the citizens’ quality of life in urban areas. This paper contributes to expanding the knowledge about ETs and its implementation in public services, identifying trends and networks in the research about these issues.

Details

Information Technology & People, vol. 37 no. 8
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 3 October 2023

Shao-Fang Wen and Basel Katt

Security assurance evaluation (SAE) is a well-established approach for assessing the effectiveness of security measures in systems. However, one aspect that is often overlooked in…

Abstract

Purpose

Security assurance evaluation (SAE) is a well-established approach for assessing the effectiveness of security measures in systems. However, one aspect that is often overlooked in these evaluations is the assurance context in which they are conducted. This paper aims to explore the role of assurance context in system SAEs and proposes a conceptual model to integrate the assurance context into the evaluation process.

Design/methodology/approach

The conceptual model highlights the interrelationships between the various elements of the assurance context, including system boundaries, stakeholders, security concerns, regulatory compliance and assurance assumptions and regulatory compliance.

Findings

By introducing the proposed conceptual model, this research provides a framework for incorporating the assurance context into SAEs and offers insights into how it can influence the evaluation outcomes.

Originality/value

By delving into the concept of assurance context, this research seeks to shed light on how it influences the scope, methodologies and outcomes of assurance evaluations, ultimately enabling organizations to strengthen their system security postures and mitigate risks effectively.

Details

Information & Computer Security, vol. 32 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

Access

Year

Last 3 months (812)

Content type

Article (812)
1 – 10 of 812