Search results
1 – 10 of over 1000Janet Chang, Xiang Xie and Ajith Kumar Parlikad
This research investigates the capabilities of Cloud-based Building Information Modelling (CBIM) in managing quality asset information, drawing upon software engineers'…
Abstract
Purpose
This research investigates the capabilities of Cloud-based Building Information Modelling (CBIM) in managing quality asset information, drawing upon software engineers' perspectives. Compelling statistics highlight the relationship between building information and environmental sustainability. However, despite the growing utilisation of CBIM in the Architecture, Engineering and Construction (AEC) industry, a significant knowledge gap remains concerning its effectiveness in maintaining quality asset information.
Design/methodology/approach
This study employed an exploratory qualitative approach, utilising semi-structured interviews with thirteen software engineers actively developing technological solutions for the AEC industry. Following thematic analysis, the findings are categorised into four dimensions: strengths, weaknesses, opportunities and technological limitations. Subsequently, these findings are analysed in relation to previously identified information quality problems.
Findings
This research reveals that while CBIM improves project coordination and information accessibility, its effectiveness is challenged by the need for manual updates, vulnerability to human errors and dependency on network services. Technological limitations, notably the absence of automated updates for as-built drawings and the risk of data loss during file conversions in the design phase, coupled with its reduced capability to validate context-specific information from the user's viewpoint, emphasise the urgent need for managerial strategies to maximise CBIM's capabilities in addressing information quality problems.
Originality/value
This study augments the understanding of CBIM, highlighting the managerial implications of a robust information management process to safeguard information integrity. This approach fosters sustainable practices anchored in reliable information essential for achieving desired outcomes. The findings also have broader managerial implications, especially for sectors that employ CBIM as an instrumental tool.
Details
Keywords
Betül Öztürk and Selin İşevcan Ertamay
The aim of this study is to investigate, in the Turkish market, the elements on the front and back labels of wine bottles depicting the characteristics of the wines and their…
Abstract
Purpose
The aim of this study is to investigate, in the Turkish market, the elements on the front and back labels of wine bottles depicting the characteristics of the wines and their impact on the purchasing decisions of wine consumers in Turkey.
Design/methodology/approach
The questionnaire consisted of 24 items that used a five-point Likert scale. Data were collected through a self-administered online survey completed by 340 participants. Following exploratory factor analysis with principal component analysis and varimax rotation, the number of factors was reduced to six: front and back-label consumer experiences, front label design elements, intrinsic cue information, back-label contents, storage/flavor profile and health warnings. The final section of the questionnaire presented five digitally designed front and back labels and asked participants to indicate their preferences.
Findings
The results indicated that reading/checking the front and back labels on wine bottles was more important than all other factors. Turkish consumers generally prefer traditional front label designs, while female consumers are more open to contemporary designs compared to male consumers. Back-label designs with more information are generally more acceptable, although female consumers with good wine knowledge may not consider food pairing, storage, or service information.
Research limitations/implications
This research was designed only based on the elements of the front and back labels. The research should expand to include packaging characteristics such as bottle shape, bottle closure, price, and situational use.
Practical implications
The findings of this study offer valuable insights for Turkish wine producers aiming to enhance their marketing strategies by customizing their wine label designs to better align with the market.
Originality/value
This study is the preliminary study to investigate Turkish consumers purchasing decisions based on the front- and back-label characteristics by using both verbal and visual elements.
Details
Keywords
Donia Waseem, Shijiao (Joseph) Chen, Zhenhua (Raymond) Xia, Nripendra P. Rana, Balkrushna Potdar and Khai Trieu Tran
In the online environment, consumers increasingly feel vulnerable due to firms’ expanding capabilities of collecting and using their data in an unsanctioned manner. Drawing from…
Abstract
Purpose
In the online environment, consumers increasingly feel vulnerable due to firms’ expanding capabilities of collecting and using their data in an unsanctioned manner. Drawing from gossip theory, this research focuses on two key suppressors of consumer vulnerability: transparency and control. Previous studies conceptualize transparency and control from rationalistic approaches that overlook individual experiences and present a unidimensional conceptualization. This research aims to understand how individuals interpret transparency and control concerning privacy vulnerability in the online environment. Additionally, it explores strategic approaches to communicating the value of transparency and control.
Design/methodology/approach
An interpretivism paradigm and phenomenology were adopted in the research design. Data were collected through semi-structured interviews with 41 participants, including consumers and experts, and analyzed through thematic analysis.
Findings
The findings identify key conceptual dimensions of transparency and control by adapting justice theory. They also reveal that firms can communicate assurance, functional, technical and social values of transparency and control to address consumer vulnerability.
Originality/value
This research makes the following contributions to the data privacy literature. The findings exhibit multidimensional and comprehensive conceptualizations of transparency and control, including user, firm and information perspectives. Additionally, the conceptual framework combines empirical insights from both experiencers and observers to offer an understanding of how transparency and control serve as justice mechanisms to effectively tackle the issue of unsanctioned transmission of personal information and subsequently address vulnerability. Lastly, the findings provide strategic approaches to communicating the value of transparency and control.
Details
Keywords
Shing Cheong Hui, Ming Yung Kwok, Elaine W.S. Kong and Dickson K.W. Chiu
Although cloud storage services can bring users valuable convenience, they can be technically complex and intrinsically insecure. Therefore, this research explores the concerns of…
Abstract
Purpose
Although cloud storage services can bring users valuable convenience, they can be technically complex and intrinsically insecure. Therefore, this research explores the concerns of academic users regarding cloud security and technical issues and how such problems may influence their continuous use in daily life.
Design/methodology/approach
This qualitative study used a semi-structured interview approach comprising six main open-ended questions to explore the information security and technical issues for the continuous use of cloud storage services by 20 undergraduate students in Hong Kong.
Findings
The analysis revealed cloud storage service users' major security and technical concerns, particularly synchronization and backup issues, were the most significant technical barrier to the continuing personal use of cloud storage services.
Originality/value
Existing literature has focused on how cloud computing services could bring benefits and security and privacy-related risks to organizations rather than security and technical issues of personal use, especially in the Asian academic context.
Details
Keywords
Mingxia Jia, Yuxiang Chris Zhao, Xiaoyu Zhang and Dawei Wu
In the era of digital intelligence, individuals are increasingly interacting with digital information in their daily lives and work, and a growing phenomenon known as digital…
Abstract
Purpose
In the era of digital intelligence, individuals are increasingly interacting with digital information in their daily lives and work, and a growing phenomenon known as digital hoarding is becoming more prevalent. Prior research suggests that humanities researchers have unique and longstanding information interaction and management practices in the digital scholarship context. This study therefore aims to understand how digital hoarding manifests in humanities researchers’ behavior, identify the influencing factors associated with it, and explore how they perceive and respond to digital hoarding behavior.
Design/methodology/approach
Qualitative research methods enable us to acquire a rich insight and nuanced understanding of digital hoarding practices. In this study, semi-structured interviews were conducted with 20 humanities researchers who were pre-screened for a high propensity for digital hoarding. Thematic analyses were then used to analyze the interview data.
Findings
Three main characteristics of digital hoarding were identified. Further, the research paradigm, digital affordance, and personality traits and habits, collectively influencing the emergence and development of digital hoarding behaviors, were examined. The subtle influence of traditional Chinese culture was encountered. Interestingly, this study found that humanists perceive digital hoarding as a positive expectation (associated with inspiration, aesthetic pursuit, and uncertainty avoidance). Meanwhile, humanists' problematic perception of this behavior is more widely observed — they experience what we conceptualize as an “expectation-perception” gap. Three specific information behaviors related to avoidance were identified as aggravating factors for digital hoarding.
Originality/value
The findings deepen the understanding of digital hoarding behaviors and personal information management among humanities researchers within the LIS field, and implications for humanities researchers, digital scholarship service providers, and digital tool developers are discussed.
Details
Keywords
Ming-Yang Li, Zong-Hao Jiang and Lei Wang
The purpose of the study is to investigate and analyze the dynamics of the government-enterprise grain joint storage mechanism, particularly, focusing on profit-driven speculative…
Abstract
Purpose
The purpose of the study is to investigate and analyze the dynamics of the government-enterprise grain joint storage mechanism, particularly, focusing on profit-driven speculative behaviors exhibited by enterprises within this context. The study aims to understand the various factors influencing the behavior of stakeholders involved in grain storage, including government storage departments, agent storage enterprises and quality inspection agencies.
Design/methodology/approach
The study employs a tripartite evolutionary game model to investigate profit-driven behaviors in government-enterprise grain joint storage. It analyzes strategies of government departments, storage enterprises and quality inspection agencies, considering factors like supervision costs and speculative risks. Simulation analysis examines tripartite payoffs, initial probabilities and the impact of digital governance levels to enhance emergency grain storage effectiveness.
Findings
The study finds that leveraging digital governance tools in government-enterprise grain joint storage mechanisms can mitigate risks, enhance efficiency and ensure the security of grain storage. It highlights the significant impact of supervision costs, speculative risks and digital supervision levels on stakeholder strategies, offering guidance to improve the effectiveness of emergency grain storage systems.
Originality/value
The originality of this study lies in its integration of digital governance tools into the analysis of the government-enterprise grain joint storage mechanism, addressing profit-driven speculative behaviors. Through a tripartite evolutionary game model, it explores stakeholder strategies, emphasizing the impact of digital supervision levels on outcomes and offering insights crucial for enhancing emergency grain storage effectiveness.
Details
Keywords
Md. Tareq Hossain Khondoker, Md. Mehrab Hossain and Ayan Saha
Due to its longer length compared to other construction materials and distinctive stacking patterns, obtaining construction steel bars in congested construction sites with limited…
Abstract
Purpose
Due to its longer length compared to other construction materials and distinctive stacking patterns, obtaining construction steel bars in congested construction sites with limited storage capacity becomes challenging. Lack of storage space in crowded places prompts the need for building steel bar storage choice optimization. Therefore, this study aims to optimize the construction steel bar procurement plan by providing when and how much rebar to order and how to stack different sizes of rebar considering limited storage capacity.
Design/methodology/approach
A novel approach has been presented in this paper by integrating 4D building information modelling (BIM) and mixed-integer linear programming (MILP). This technique uses BIM to retrieve material quantities, including rebar, during the design phase. Following that, activities are scheduled depending on the duration determined by crew productivity data and material quantity. Then, based on the prior price, the price of each unit of rebar is projected for the duration of construction using the exponential smoothing method. After that, the MILP approach is used to generate an optimal steel bar procurement plan for limited storage space following the scheduled rebar-related operations.
Findings
The developed strategy minimizes overall procurement costs and ensures the storage of rebar as per standard guidelines. An optimal rebar procurement and storage plan to construct a six-storied RC frame has been presented in this paper as a demonstrative example to show the effectiveness of the proposed method.
Originality/value
This work partially satisfies a long-sought research need for establishing a comprehensive construction steel bar procurement system, making it a very useful source of information for practitioners and researchers. The proposed method can be used to minimize a key performance limitation that the conventional rebar procurement practice for crowded building sites may experience.
Details
Keywords
Farwa Taqi, Alia Arshad and Syeda Hina Batool
This study aims to evaluate the usability of Google Drive (GD) in addition to measuring the effectiveness of GD and the challenges faced while using this cloud storage application…
Abstract
Purpose
This study aims to evaluate the usability of Google Drive (GD) in addition to measuring the effectiveness of GD and the challenges faced while using this cloud storage application among public library users of Lahore.
Design/methodology/approach
The study adopted a sequential explanatory mixed method design comprising the quantitative (QUAN) and qualitative (QUAL) parts. For the QUAN phase, a questionnaire survey was conducted among 384 users of public libraries through purposive sampling. For the QUAL phase, the think aloud technique was performed on several tasks during experiments and verbalized their thoughts and experiences while interacting with the system. The cloud usability model (CUM) was used to measure the “usability” of GD.
Findings
Findings indicated that most users were satisfied with GD's obvious features and inherent functions. QUAL results indicated that respondents did most tasks easily, whereas only some could complete the task.
Research limitations/implications
The study is valuable as it is the first time used CUM to measure the perceived usability of GD. Second, the study used a mixed method study to get insights into perceived usability, effectiveness and challenges while using GD. The findings might be helpful for cloud support teams, including GD, as they can enhance certain features of usability, which lead to increased usage among users.
Originality/value
This research work is based on MPhil thesis.
Details
Keywords
Ali Vafaei-Zadeh, Davoud Nikbin, Jing Loo and Haniruzila Hanifah
This study aims to investigate the factors that influence the continuance intention to use personal cloud storage services among Generation Y.
Abstract
Purpose
This study aims to investigate the factors that influence the continuance intention to use personal cloud storage services among Generation Y.
Design/methodology/approach
A quantitative online survey was carried out to collect data from 271 respondents. Structural equation modelling with SmartPLS 4.0 software was used to run the analysis and examine the hypothesized relationships in the research model.
Findings
The study revealed that both satisfaction and habit exert a significant influence on continuance intention, whereas self-efficacy does not demonstrate a significant effect. In addition, satisfaction was found to be influenced by confirmation, perceived usefulness and perceived security. Furthermore, confirmation and cloud storage service quality were found to impact perceived usefulness, while confirmation also had an effect on perceived security. However, the hypothesized moderating role of perceived privacy risk in the relationship between perceived usefulness, perceived security and satisfaction was not supported.
Originality/value
This study advances the field by adapting an expanded expectation-confirmation model that delineates the nuanced impacts of habit, user satisfaction and self-efficacy on Generation Y’s continuance intention to use personal cloud storage services. It challenges the conventional wisdom regarding self-efficacy’s influence on technology adoption, offering a more intricate portrayal of its role. This research contributes a distinctive theoretical perspective, emphasizing the complex interplay of factors that inform sustained user engagement with cloud technologies.
Details
Keywords
Asad Ullah Khan, Saeed Ullah Jan, Muhammad Naeem Khan, Fazeelat Aziz, Jan Muhammad Sohu, Johar Ali, Maqbool Khan and Sohail Raza Chohan
Blockchain, a groundbreaking technology that recently surfaced, is under thorough scrutiny due to its prospective utility across different sectors. This research aims to delve…
Abstract
Purpose
Blockchain, a groundbreaking technology that recently surfaced, is under thorough scrutiny due to its prospective utility across different sectors. This research aims to delve into and assess the cognitive elements that impact the integration of blockchain technology (BT) within library environments.
Design/methodology/approach
Utilizing the Stimulus–Organism–Response (SOR) theory, this research aims to facilitate the implementation of BT within academic institution libraries and provide valuable insights for managerial decision-making. A two-staged deep learning structural equation modelling artificial neural network (ANN) analysis was conducted on 583 computer experts affiliated with academic institutions across various countries to gather relevant information.
Findings
The research model can correspondingly expound 71% and 60% of the variance in trust and adoption intention of BT in libraries, where ANN results indicate that perceived possession is the primary predictor, with a technical capability factor that has a normalized significance of 84%. The study successfully identified the relationship of each variable of our conceptual model.
Originality/value
Unlike the SOR theory framework that uses a linear model and theoretically assumes that all relationships are significant, to the best of the authors’ knowledge, it is the first study to validate ANN and SEM in a library context successfully. The results of the two-step PLS–SEM and ANN technique demonstrate that the usage of ANN validates the PLS–SEM analysis. ANN can represent complicated linear and nonlinear connections with higher prediction accuracy than SEM approaches. Also, an importance-performance Map analysis of the PLS–SEM data offers a more detailed insight into each factor's significance and performance.
Details