Search results
1 – 10 of 310Eduardo André Cândido Da Silva, Flávio Santino Bizarrias, Renato Penha, Luciano Ferreira da Silva and Cristiane Drebes Pedron
Despite the significant interest from researchers and practitioners, the literature on project value measurement from the perspective of the customer is non-existent. This study…
Abstract
Purpose
Despite the significant interest from researchers and practitioners, the literature on project value measurement from the perspective of the customer is non-existent. This study aims to address this gap by developing and validating a scale to measure project value through a customer lens called the customer perception of project value scale.
Design/methodology/approach
A list of items was initially generated based on 762 sample responses through a systematic review of the literature and with the participation of specialists. Exploratory and confirmatory factorial analyses and structural equation modelling were used to develop and validate the scale.
Findings
The authors formulated a four-dimension scale. The dimensions used to measure the second-order construct are customer centrality, process, delivery and cost-benefit. This was validated using a nomological structure.
Research limitations/implications
The non-consensual nature of what is value in projects restricts the results of this study to the context of a specific group of stakeholders only, that is, the consumers of the projects. The authors also see limitations in the absence of competing scales, which do not allow the comparison of the instrument with alternative measures.
Practical implications
This study allows project managers and other professionals to measure a project’s perceived value from the customer’s point of view and manage the improvement of this perception.
Originality/value
To the best of the authors’ knowledge, this is the first study to propose a scale to measure project value, which advances the literature on project management and value and contributes to academic knowledge and practice by measuring project value from the customer standpoint.
Details
Keywords
Linda Salma Angreani, Annas Vijaya and Hendro Wicaksono
A maturity model for Industry 4.0 (I4.0 MM) with influencing factors is designed to address maturity issues in adopting Industry 4.0. Standardisation in I4.0 supports…
Abstract
Purpose
A maturity model for Industry 4.0 (I4.0 MM) with influencing factors is designed to address maturity issues in adopting Industry 4.0. Standardisation in I4.0 supports manufacturing industry transformation, forming reference architecture models (RAMs). This paper aligns key factors and maturity levels in I4.0 MMs with reputable I4.0 RAMs to enhance strategy for I4.0 transformation and implementation.
Design/methodology/approach
Three steps of alignment consist of the systematic literature review (SLR) method to study the current published high-quality I4.0 MMs, the taxonomy development of I4.0 influencing factors by adapting and implementing the categorisation of system theories and aligning I4.0 MMs with RAMs.
Findings
The study discovered that different I4.0 MMs lead to varied organisational interpretations. Challenges and insights arise when aligning I4.0 MMs with RAMs. Aligning MM levels with RAM stages is a crucial milestone in the journey toward I4.0 transformation. Evidence indicates that I4.0 MMs and RAMs often overlook the cultural domain.
Research limitations/implications
Findings contribute to the literature on aligning capabilities with implementation strategies while employing I4.0 MMs and RAMs. We use five RAMs (RAMI4.0, NIST-SME, IMSA, IVRA and IIRA), and as a common limitation in SLR, there could be a subjective bias in reading and selecting literature.
Practical implications
To fully leverage the capabilities of RAMs as part of the I4.0 implementation strategy, companies should initiate the process by undertaking a thorough needs assessment using I4.0 MMs.
Originality/value
The novelty of this paper lies in being the first to examine the alignment of I4.0 MMs with established RAMs. It offers valuable insights for improving I4.0 implementation strategies, especially for companies using both MMs and RAMs in their transformation efforts.
Details
Keywords
Shiqing Wu, Jiahai Wang, Haibin Jiang and Weiye Xue
The purpose of this study is to explore a new assembly process planning and execution mode to realize rapid response, reduce the labor intensity of assembly workers and improve…
Abstract
Purpose
The purpose of this study is to explore a new assembly process planning and execution mode to realize rapid response, reduce the labor intensity of assembly workers and improve the assembly efficiency and quality.
Design/methodology/approach
Based on the related concepts of digital twin, this paper studies the product assembly planning in digital space, the process execution in physical space and the interaction between digital space and physical space. The assembly process planning is simulated and verified in the digital space to generate three-dimensional visual assembly process specification documents, the implementation of the assembly process specification documents in the physical space is monitored and feed back to revise the assembly process and improve the assembly quality.
Findings
Digital twin technology enhances the quality and efficiency of assembly process planning and execution system.
Originality/value
It provides a new perspective for assembly process planning and execution, the architecture, connections and data acquisition approaches of the digital twin-driven framework are proposed in this paper, which is of important theoretical values. What is more, a smart assembly workbench is developed, the specific image classification algorithms are presented in detail too, which is of some industrial application values.
Details
Keywords
Security assurance evaluation (SAE) is a well-established approach for assessing the effectiveness of security measures in systems. However, one aspect that is often overlooked in…
Abstract
Purpose
Security assurance evaluation (SAE) is a well-established approach for assessing the effectiveness of security measures in systems. However, one aspect that is often overlooked in these evaluations is the assurance context in which they are conducted. This paper aims to explore the role of assurance context in system SAEs and proposes a conceptual model to integrate the assurance context into the evaluation process.
Design/methodology/approach
The conceptual model highlights the interrelationships between the various elements of the assurance context, including system boundaries, stakeholders, security concerns, regulatory compliance and assurance assumptions and regulatory compliance.
Findings
By introducing the proposed conceptual model, this research provides a framework for incorporating the assurance context into SAEs and offers insights into how it can influence the evaluation outcomes.
Originality/value
By delving into the concept of assurance context, this research seeks to shed light on how it influences the scope, methodologies and outcomes of assurance evaluations, ultimately enabling organizations to strengthen their system security postures and mitigate risks effectively.
Details
Keywords
C. Bharanidharan, S. Malathi and Hariprasath Manoharan
The potential of vehicle ad hoc networks (VANETs) to improve driver and passenger safety and security has made them a hot topic in the field of intelligent transportation systems…
Abstract
Purpose
The potential of vehicle ad hoc networks (VANETs) to improve driver and passenger safety and security has made them a hot topic in the field of intelligent transportation systems (ITSs). VANETs have different characteristics and system architectures from mobile ad hoc networks (MANETs), with a primary focus on vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communication. But protecting VANETs from malicious assaults is crucial because they can undermine network security and safety.
Design/methodology/approach
The black hole attack is a well-known danger to VANETs. It occurs when a hostile node introduces phony routing tables into the network, potentially damaging it and interfering with communication. A safe ad hoc on-demand distance vector (AODV) routing protocol has been created in response to this issue. By adding cryptographic features for source and target node verification to the route request (RREQ) and route reply (RREP) packets, this protocol improves upon the original AODV routing system.
Findings
Through the use of cryptographic-based encryption and decryption techniques, the suggested method fortifies the VANET connection. In addition, other network metrics are taken into account to assess the effectiveness of the secure AODV routing protocol under black hole attacks, including packet loss, end-to-end latency, packet delivery ratio (PDR) and routing request overhead. Results from simulations using an NS-2.33 simulator show how well the suggested fix works to enhance system performance and lessen the effects of black hole assaults on VANETs.
Originality/value
All things considered, the safe AODV routing protocol provides a strong method for improving security and dependability in VANET systems, protecting against malevolent attacks and guaranteeing smooth communication between cars and infrastructure.
Details
Keywords
Imon Chowdhooree, Tasfin Aziz, Md. Jubaer Rashid and Meherab Hossain
Urban areas, especially in the coastal region of Bangladesh, face environmental degradation due to rapid urbanization, uncontrolled socio-economic activities and experiencing the…
Abstract
Purpose
Urban areas, especially in the coastal region of Bangladesh, face environmental degradation due to rapid urbanization, uncontrolled socio-economic activities and experiencing the adverse impacts of climate change. Nature-based solutions (NbS) as options for restoring, preserving, maintaining and elevating natural features or systems are becoming popular for reducing vulnerabilities caused either by natural hazards or human-induced activities. With this understanding, this study aims to explore the need of practicing NbS by studying the condition of a tidal canal (known as Thakurani Khal) and its peripheral areas of Mongla Port Municipality, a coastal and seaport town in Bangladesh.
Design/methodology/approach
This case study-based research uses multiple inquiries, including focus group discussions, pair-wise comparison, observation, GIS-based mapping, key informant interviews and secondary climate data review, to understand the spatial development of the area and community reactions to the changes in the urban environment.
Findings
The natural water flow of this canal is controlled by sluice gates that indirectly allowed the dweller to encroach its lands and convert the canal into a solid waste dumping area. These human-induced activities as well as the climate change-induced events (i.e. extreme heat, intensive and irregular rainfall, increased number of cyclones, etc.) have made the adjacent areas prone to waterlogging and drainage congestion. In this context, the revival of the original natural quality of the canal has been identified as an alternative to ensuring an adaptive urban environment.
Originality/value
This research highlights the importance of practicing NbS for developing urban resilience in the context of climate change.
Details
Keywords
Hafiez Sofyani and Emile Satia Darma
This study aims to examine the effect of application architecture and application efficiency on the intention to continue using Islamic bank with data security as a moderator. The…
Abstract
Purpose
This study aims to examine the effect of application architecture and application efficiency on the intention to continue using Islamic bank with data security as a moderator. The investigation was situated within the framework of a hacker attack that compromised the security of customer data at one of Indonesia’s largest Islamic bank.
Design/methodology/approach
A survey questionnaire method was used, and the sample population comprised users of Islamic bank in Indonesia. The respondents were then selected purposively with the criteria of individuals who were using mobile banking services. Furthermore, data collection in this study was carried out by distributing questionnaires online. To validate the questionnaire, consultation and validation were conducted by engaging four experts and conducting a pilot study. Hypothesis testing was performed using the structural equation modeling method based on partial least squares.
Findings
The results of the partial least square structural model assessment showed that application efficiency and data security positively influenced the intention to continue using Islamic bank, while application architecture had no effect. Furthermore, data security could not moderate the relationship between application architecture and efficiency toward the intention to continue using Islamic bank.
Practical implications
The results of this study suggested that Islamic banking practitioners must prioritize the enhancement of digital banking services, with a specific focus on improving application efficiency and ensuring robust data security. These two dimensions were critical determinants influencing the intention to continue using Islamic bank.
Originality/value
This study addressed the issue of data security as a moderator, particularly in the context of hacker attacks targeting a major Islamic bank in Indonesia. Furthermore, this current report expounded on the study conducted by Mir et al. (2022) by introducing novel dimensions to the e-service quality of internet banking.
Details
Keywords
Giovanna Culot, Guido Orzes, Marco Sartor and Guido Nassimbeni
This study aims to analyze the factors that drive or prevent interorganizational data sharing in the context of digital transformation (DT). Data sharing appears as a precondition…
Abstract
Purpose
This study aims to analyze the factors that drive or prevent interorganizational data sharing in the context of digital transformation (DT). Data sharing appears as a precondition for companies to capture emerging opportunities in supply chain management and for product-related servitization; however, there are ongoing concerns, and data are often perceived as the “new oil.” It is thus important to gain a better understanding of the determinants of firms’ decisions.
Design/methodology/approach
The authors develop an embedded case study analysis involving 16 firms within an extended supply network in the automotive industry. The authors focus on the peculiarities of the new context, as opposed to elements highlighted by research prior to the advent of the latest technologies. Abductive reasoning is applied to the theoretical foundations of the resource-based view, resource dependence theory and the complex adaptive systems perspective.
Findings
Data sharing is largely underpinned by factors identified prior to DT, such as data specificity, dependence dynamics and protection mechanisms and the dynamism of the business context. DT, however, can influence the extent of data sharing. New factors concern complementarities whenever data are pooled from different sources and digital platforms, as well as different forms of data ownership protection.
Originality/value
This study stresses that data sharing in the context of DT can be explained through established theoretical lenses, providing the integration of elements accounting for new technological opportunities.
Details
Keywords
Utkarsh Shrivastava, Bernard Han, Ying Zhou and Muhammad Razi
Sharing patient health information (PHI) among hospitals has been much slower than the adoption of health record systems. This paper aims to investigate if privacy regulation (PR…
Abstract
Purpose
Sharing patient health information (PHI) among hospitals has been much slower than the adoption of health record systems. This paper aims to investigate if privacy regulation (PR) or security measures (SMs) influence hospitals’ use of health information exchange (HIE) to share PHI with other providers (e.g. physicians, labs, hospitals). The study specifically focuses on how multiple PRs can impede and a strong national security infrastructure (NSI) can support HIE.
Design/methodology/approach
The study uses secondary data from a multi-national and multi-hospital survey administered by the European Union. The multi-level structure of the cross-sectional panel data is used to test the influence of both hospital-level (e.g. PR) and national-level variables (e.g. NSI) on HIE. A total of nine types of HIE, three types of PRs, nine SMs and other relevant control variables are considered. This study uses a two-level random intercept generalized linear model to test the hypothesis proposed in the study.
Findings
The study finds that national-level PRs (NLPR) have the strongest positive influence on HIE in comparison to regional (RLPR) and hospital-level (HLPR) PRs. Moreover, the study finds evidence that the presence of RLPR and HLPR, on average, decreases the positive impact of NLPR by 264%. The SMs also have a significant and positive impact on HIE. Adoption of an additional SM can increase the odds of engaging in a certain type of HIE between 21% and 61%. On the other hand, a strong NSI can also amplify the positive impact of SM on certain types of HIE.
Originality/value
This study extends prior research on the role of PRs in enabling HIE by considering the complexities brought up by adopting multiple PRs. NLPRs have the strongest impact on HIE in comparison to RLPRs or HLPRs. Moreover, public infrastructure initiatives such as those related to secure communications can also complement SMs adopted by the providers by encouraging HIE.
Details
Keywords
Afiqah R. Radzi, Nur Farhana Azmi, Syahrul Nizam Kamaruzzaman, Rahimi A. Rahman and Eleni Papadonikolaki
Digital twin (DT) and building information modeling (BIM) are interconnected in some ways. However, there has been some misconception about how DT differs from BIM. As a result…
Abstract
Purpose
Digital twin (DT) and building information modeling (BIM) are interconnected in some ways. However, there has been some misconception about how DT differs from BIM. As a result, industry professionals reject DT even in BIM-based construction projects due to reluctance to innovate. Furthermore, researchers have repeatedly developed tools and techniques with the same goals using DT and BIM to assist practitioners in construction projects. Therefore, this study aims to assist industry professionals and researchers in understanding the relationship between DT and BIM and synthesize existing works on DT and BIM.
Design/methodology/approach
A systematic review was conducted on published articles related to DT and BIM. A total record of 54 journal articles were identified and analyzed.
Findings
The analysis of the selected journal articles revealed four types of relationships between DT and BIM: BIM is a subset of DT, DT is a subset of BIM, BIM is DT, and no relationship between BIM and DT. The existing research on DT and BIM in construction projects targets improvements in five areas: planning, design, construction, operations and maintenance, and decommissioning. In addition, several areas have emerged, such as developing geo-referencing approaches for infrastructure projects, applying the proposed methodology to other construction geometries and creating 3D visualization using color schemes.
Originality/value
This study contributed to the existing body of knowledge by overviewing existing research related to DT and BIM in construction projects. Also, it reveals research gaps in the body of knowledge to point out directions for future research.
Details