Search results

1 – 10 of over 1000
Article
Publication date: 30 August 2024

Janet Chang, Xiang Xie and Ajith Kumar Parlikad

This research investigates the capabilities of Cloud-based Building Information Modelling (CBIM) in managing quality asset information, drawing upon software engineers'…

Abstract

Purpose

This research investigates the capabilities of Cloud-based Building Information Modelling (CBIM) in managing quality asset information, drawing upon software engineers' perspectives. Compelling statistics highlight the relationship between building information and environmental sustainability. However, despite the growing utilisation of CBIM in the Architecture, Engineering and Construction (AEC) industry, a significant knowledge gap remains concerning its effectiveness in maintaining quality asset information.

Design/methodology/approach

This study employed an exploratory qualitative approach, utilising semi-structured interviews with thirteen software engineers actively developing technological solutions for the AEC industry. Following thematic analysis, the findings are categorised into four dimensions: strengths, weaknesses, opportunities and technological limitations. Subsequently, these findings are analysed in relation to previously identified information quality problems.

Findings

This research reveals that while CBIM improves project coordination and information accessibility, its effectiveness is challenged by the need for manual updates, vulnerability to human errors and dependency on network services. Technological limitations, notably the absence of automated updates for as-built drawings and the risk of data loss during file conversions in the design phase, coupled with its reduced capability to validate context-specific information from the user's viewpoint, emphasise the urgent need for managerial strategies to maximise CBIM's capabilities in addressing information quality problems.

Originality/value

This study augments the understanding of CBIM, highlighting the managerial implications of a robust information management process to safeguard information integrity. This approach fosters sustainable practices anchored in reliable information essential for achieving desired outcomes. The findings also have broader managerial implications, especially for sectors that employ CBIM as an instrumental tool.

Details

Built Environment Project and Asset Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2044-124X

Keywords

Article
Publication date: 6 August 2024

Betül Öztürk and Selin İşevcan Ertamay

The aim of this study is to investigate, in the Turkish market, the elements on the front and back labels of wine bottles depicting the characteristics of the wines and their…

Abstract

Purpose

The aim of this study is to investigate, in the Turkish market, the elements on the front and back labels of wine bottles depicting the characteristics of the wines and their impact on the purchasing decisions of wine consumers in Turkey.

Design/methodology/approach

The questionnaire consisted of 24 items that used a five-point Likert scale. Data were collected through a self-administered online survey completed by 340 participants. Following exploratory factor analysis with principal component analysis and varimax rotation, the number of factors was reduced to six: front and back-label consumer experiences, front label design elements, intrinsic cue information, back-label contents, storage/flavor profile and health warnings. The final section of the questionnaire presented five digitally designed front and back labels and asked participants to indicate their preferences.

Findings

The results indicated that reading/checking the front and back labels on wine bottles was more important than all other factors. Turkish consumers generally prefer traditional front label designs, while female consumers are more open to contemporary designs compared to male consumers. Back-label designs with more information are generally more acceptable, although female consumers with good wine knowledge may not consider food pairing, storage, or service information.

Research limitations/implications

This research was designed only based on the elements of the front and back labels. The research should expand to include packaging characteristics such as bottle shape, bottle closure, price, and situational use.

Practical implications

The findings of this study offer valuable insights for Turkish wine producers aiming to enhance their marketing strategies by customizing their wine label designs to better align with the market.

Originality/value

This study is the preliminary study to investigate Turkish consumers purchasing decisions based on the front- and back-label characteristics by using both verbal and visual elements.

Details

International Journal of Wine Business Research, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1751-1062

Keywords

Article
Publication date: 19 February 2024

Donia Waseem, Shijiao (Joseph) Chen, Zhenhua (Raymond) Xia, Nripendra P. Rana, Balkrushna Potdar and Khai Trieu Tran

In the online environment, consumers increasingly feel vulnerable due to firms’ expanding capabilities of collecting and using their data in an unsanctioned manner. Drawing from…

Abstract

Purpose

In the online environment, consumers increasingly feel vulnerable due to firms’ expanding capabilities of collecting and using their data in an unsanctioned manner. Drawing from gossip theory, this research focuses on two key suppressors of consumer vulnerability: transparency and control. Previous studies conceptualize transparency and control from rationalistic approaches that overlook individual experiences and present a unidimensional conceptualization. This research aims to understand how individuals interpret transparency and control concerning privacy vulnerability in the online environment. Additionally, it explores strategic approaches to communicating the value of transparency and control.

Design/methodology/approach

An interpretivism paradigm and phenomenology were adopted in the research design. Data were collected through semi-structured interviews with 41 participants, including consumers and experts, and analyzed through thematic analysis.

Findings

The findings identify key conceptual dimensions of transparency and control by adapting justice theory. They also reveal that firms can communicate assurance, functional, technical and social values of transparency and control to address consumer vulnerability.

Originality/value

This research makes the following contributions to the data privacy literature. The findings exhibit multidimensional and comprehensive conceptualizations of transparency and control, including user, firm and information perspectives. Additionally, the conceptual framework combines empirical insights from both experiencers and observers to offer an understanding of how transparency and control serve as justice mechanisms to effectively tackle the issue of unsanctioned transmission of personal information and subsequently address vulnerability. Lastly, the findings provide strategic approaches to communicating the value of transparency and control.

Details

Internet Research, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 3 March 2023

Shing Cheong Hui, Ming Yung Kwok, Elaine W.S. Kong and Dickson K.W. Chiu

Although cloud storage services can bring users valuable convenience, they can be technically complex and intrinsically insecure. Therefore, this research explores the concerns of…

Abstract

Purpose

Although cloud storage services can bring users valuable convenience, they can be technically complex and intrinsically insecure. Therefore, this research explores the concerns of academic users regarding cloud security and technical issues and how such problems may influence their continuous use in daily life.

Design/methodology/approach

This qualitative study used a semi-structured interview approach comprising six main open-ended questions to explore the information security and technical issues for the continuous use of cloud storage services by 20 undergraduate students in Hong Kong.

Findings

The analysis revealed cloud storage service users' major security and technical concerns, particularly synchronization and backup issues, were the most significant technical barrier to the continuing personal use of cloud storage services.

Originality/value

Existing literature has focused on how cloud computing services could bring benefits and security and privacy-related risks to organizations rather than security and technical issues of personal use, especially in the Asian academic context.

Details

Library Hi Tech, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0737-8831

Keywords

Article
Publication date: 1 August 2024

Mingxia Jia, Yuxiang Chris Zhao, Xiaoyu Zhang and Dawei Wu

In the era of digital intelligence, individuals are increasingly interacting with digital information in their daily lives and work, and a growing phenomenon known as digital…

Abstract

Purpose

In the era of digital intelligence, individuals are increasingly interacting with digital information in their daily lives and work, and a growing phenomenon known as digital hoarding is becoming more prevalent. Prior research suggests that humanities researchers have unique and longstanding information interaction and management practices in the digital scholarship context. This study therefore aims to understand how digital hoarding manifests in humanities researchers’ behavior, identify the influencing factors associated with it, and explore how they perceive and respond to digital hoarding behavior.

Design/methodology/approach

Qualitative research methods enable us to acquire a rich insight and nuanced understanding of digital hoarding practices. In this study, semi-structured interviews were conducted with 20 humanities researchers who were pre-screened for a high propensity for digital hoarding. Thematic analyses were then used to analyze the interview data.

Findings

Three main characteristics of digital hoarding were identified. Further, the research paradigm, digital affordance, and personality traits and habits, collectively influencing the emergence and development of digital hoarding behaviors, were examined. The subtle influence of traditional Chinese culture was encountered. Interestingly, this study found that humanists perceive digital hoarding as a positive expectation (associated with inspiration, aesthetic pursuit, and uncertainty avoidance). Meanwhile, humanists' problematic perception of this behavior is more widely observed — they experience what we conceptualize as an “expectation-perception” gap. Three specific information behaviors related to avoidance were identified as aggravating factors for digital hoarding.

Originality/value

The findings deepen the understanding of digital hoarding behaviors and personal information management among humanities researchers within the LIS field, and implications for humanities researchers, digital scholarship service providers, and digital tool developers are discussed.

Details

Journal of Documentation, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0022-0418

Keywords

Article
Publication date: 6 June 2024

Ming-Yang Li, Zong-Hao Jiang and Lei Wang

The purpose of the study is to investigate and analyze the dynamics of the government-enterprise grain joint storage mechanism, particularly, focusing on profit-driven speculative…

Abstract

Purpose

The purpose of the study is to investigate and analyze the dynamics of the government-enterprise grain joint storage mechanism, particularly, focusing on profit-driven speculative behaviors exhibited by enterprises within this context. The study aims to understand the various factors influencing the behavior of stakeholders involved in grain storage, including government storage departments, agent storage enterprises and quality inspection agencies.

Design/methodology/approach

The study employs a tripartite evolutionary game model to investigate profit-driven behaviors in government-enterprise grain joint storage. It analyzes strategies of government departments, storage enterprises and quality inspection agencies, considering factors like supervision costs and speculative risks. Simulation analysis examines tripartite payoffs, initial probabilities and the impact of digital governance levels to enhance emergency grain storage effectiveness.

Findings

The study finds that leveraging digital governance tools in government-enterprise grain joint storage mechanisms can mitigate risks, enhance efficiency and ensure the security of grain storage. It highlights the significant impact of supervision costs, speculative risks and digital supervision levels on stakeholder strategies, offering guidance to improve the effectiveness of emergency grain storage systems.

Originality/value

The originality of this study lies in its integration of digital governance tools into the analysis of the government-enterprise grain joint storage mechanism, addressing profit-driven speculative behaviors. Through a tripartite evolutionary game model, it explores stakeholder strategies, emphasizing the impact of digital supervision levels on outcomes and offering insights crucial for enhancing emergency grain storage effectiveness.

Details

Kybernetes, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0368-492X

Keywords

Article
Publication date: 22 January 2024

Md. Tareq Hossain Khondoker, Md. Mehrab Hossain and Ayan Saha

Due to its longer length compared to other construction materials and distinctive stacking patterns, obtaining construction steel bars in congested construction sites with limited…

Abstract

Purpose

Due to its longer length compared to other construction materials and distinctive stacking patterns, obtaining construction steel bars in congested construction sites with limited storage capacity becomes challenging. Lack of storage space in crowded places prompts the need for building steel bar storage choice optimization. Therefore, this study aims to optimize the construction steel bar procurement plan by providing when and how much rebar to order and how to stack different sizes of rebar considering limited storage capacity.

Design/methodology/approach

A novel approach has been presented in this paper by integrating 4D building information modelling (BIM) and mixed-integer linear programming (MILP). This technique uses BIM to retrieve material quantities, including rebar, during the design phase. Following that, activities are scheduled depending on the duration determined by crew productivity data and material quantity. Then, based on the prior price, the price of each unit of rebar is projected for the duration of construction using the exponential smoothing method. After that, the MILP approach is used to generate an optimal steel bar procurement plan for limited storage space following the scheduled rebar-related operations.

Findings

The developed strategy minimizes overall procurement costs and ensures the storage of rebar as per standard guidelines. An optimal rebar procurement and storage plan to construct a six-storied RC frame has been presented in this paper as a demonstrative example to show the effectiveness of the proposed method.

Originality/value

This work partially satisfies a long-sought research need for establishing a comprehensive construction steel bar procurement system, making it a very useful source of information for practitioners and researchers. The proposed method can be used to minimize a key performance limitation that the conventional rebar procurement practice for crowded building sites may experience.

Details

Construction Innovation , vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1471-4175

Keywords

Article
Publication date: 30 July 2024

Farwa Taqi, Alia Arshad and Syeda Hina Batool

This study aims to evaluate the usability of Google Drive (GD) in addition to measuring the effectiveness of GD and the challenges faced while using this cloud storage application…

Abstract

Purpose

This study aims to evaluate the usability of Google Drive (GD) in addition to measuring the effectiveness of GD and the challenges faced while using this cloud storage application among public library users of Lahore.

Design/methodology/approach

The study adopted a sequential explanatory mixed method design comprising the quantitative (QUAN) and qualitative (QUAL) parts. For the QUAN phase, a questionnaire survey was conducted among 384 users of public libraries through purposive sampling. For the QUAL phase, the think aloud technique was performed on several tasks during experiments and verbalized their thoughts and experiences while interacting with the system. The cloud usability model (CUM) was used to measure the “usability” of GD.

Findings

Findings indicated that most users were satisfied with GD's obvious features and inherent functions. QUAL results indicated that respondents did most tasks easily, whereas only some could complete the task.

Research limitations/implications

The study is valuable as it is the first time used CUM to measure the perceived usability of GD. Second, the study used a mixed method study to get insights into perceived usability, effectiveness and challenges while using GD. The findings might be helpful for cloud support teams, including GD, as they can enhance certain features of usability, which lead to increased usage among users.

Originality/value

This research work is based on MPhil thesis.

Details

Global Knowledge, Memory and Communication, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2514-9342

Keywords

Article
Publication date: 26 August 2024

Ali Vafaei-Zadeh, Davoud Nikbin, Jing Loo and Haniruzila Hanifah

This study aims to investigate the factors that influence the continuance intention to use personal cloud storage services among Generation Y.

Abstract

Purpose

This study aims to investigate the factors that influence the continuance intention to use personal cloud storage services among Generation Y.

Design/methodology/approach

A quantitative online survey was carried out to collect data from 271 respondents. Structural equation modelling with SmartPLS 4.0 software was used to run the analysis and examine the hypothesized relationships in the research model.

Findings

The study revealed that both satisfaction and habit exert a significant influence on continuance intention, whereas self-efficacy does not demonstrate a significant effect. In addition, satisfaction was found to be influenced by confirmation, perceived usefulness and perceived security. Furthermore, confirmation and cloud storage service quality were found to impact perceived usefulness, while confirmation also had an effect on perceived security. However, the hypothesized moderating role of perceived privacy risk in the relationship between perceived usefulness, perceived security and satisfaction was not supported.

Originality/value

This study advances the field by adapting an expanded expectation-confirmation model that delineates the nuanced impacts of habit, user satisfaction and self-efficacy on Generation Y’s continuance intention to use personal cloud storage services. It challenges the conventional wisdom regarding self-efficacy’s influence on technology adoption, offering a more intricate portrayal of its role. This research contributes a distinctive theoretical perspective, emphasizing the complex interplay of factors that inform sustained user engagement with cloud technologies.

Details

The Electronic Library , vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0264-0473

Keywords

Article
Publication date: 2 August 2024

Asad Ullah Khan, Saeed Ullah Jan, Muhammad Naeem Khan, Fazeelat Aziz, Jan Muhammad Sohu, Johar Ali, Maqbool Khan and Sohail Raza Chohan

Blockchain, a groundbreaking technology that recently surfaced, is under thorough scrutiny due to its prospective utility across different sectors. This research aims to delve…

Abstract

Purpose

Blockchain, a groundbreaking technology that recently surfaced, is under thorough scrutiny due to its prospective utility across different sectors. This research aims to delve into and assess the cognitive elements that impact the integration of blockchain technology (BT) within library environments.

Design/methodology/approach

Utilizing the Stimulus–Organism–Response (SOR) theory, this research aims to facilitate the implementation of BT within academic institution libraries and provide valuable insights for managerial decision-making. A two-staged deep learning structural equation modelling artificial neural network (ANN) analysis was conducted on 583 computer experts affiliated with academic institutions across various countries to gather relevant information.

Findings

The research model can correspondingly expound 71% and 60% of the variance in trust and adoption intention of BT in libraries, where ANN results indicate that perceived possession is the primary predictor, with a technical capability factor that has a normalized significance of 84%. The study successfully identified the relationship of each variable of our conceptual model.

Originality/value

Unlike the SOR theory framework that uses a linear model and theoretically assumes that all relationships are significant, to the best of the authors’ knowledge, it is the first study to validate ANN and SEM in a library context successfully. The results of the two-step PLS–SEM and ANN technique demonstrate that the usage of ANN validates the PLS–SEM analysis. ANN can represent complicated linear and nonlinear connections with higher prediction accuracy than SEM approaches. Also, an importance-performance Map analysis of the PLS–SEM data offers a more detailed insight into each factor's significance and performance.

Details

Library Hi Tech, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0737-8831

Keywords

1 – 10 of over 1000