Search results

1 – 10 of 310
Article
Publication date: 13 October 2023

Eduardo André Cândido Da Silva, Flávio Santino Bizarrias, Renato Penha, Luciano Ferreira da Silva and Cristiane Drebes Pedron

Despite the significant interest from researchers and practitioners, the literature on project value measurement from the perspective of the customer is non-existent. This study…

Abstract

Purpose

Despite the significant interest from researchers and practitioners, the literature on project value measurement from the perspective of the customer is non-existent. This study aims to address this gap by developing and validating a scale to measure project value through a customer lens called the customer perception of project value scale.

Design/methodology/approach

A list of items was initially generated based on 762 sample responses through a systematic review of the literature and with the participation of specialists. Exploratory and confirmatory factorial analyses and structural equation modelling were used to develop and validate the scale.

Findings

The authors formulated a four-dimension scale. The dimensions used to measure the second-order construct are customer centrality, process, delivery and cost-benefit. This was validated using a nomological structure.

Research limitations/implications

The non-consensual nature of what is value in projects restricts the results of this study to the context of a specific group of stakeholders only, that is, the consumers of the projects. The authors also see limitations in the absence of competing scales, which do not allow the comparison of the instrument with alternative measures.

Practical implications

This study allows project managers and other professionals to measure a project’s perceived value from the customer’s point of view and manage the improvement of this perception.

Originality/value

To the best of the authors’ knowledge, this is the first study to propose a scale to measure project value, which advances the literature on project management and value and contributes to academic knowledge and practice by measuring project value from the customer standpoint.

Details

European Business Review, vol. 36 no. 3
Type: Research Article
ISSN: 0955-534X

Keywords

Open Access
Article
Publication date: 29 April 2024

Linda Salma Angreani, Annas Vijaya and Hendro Wicaksono

A maturity model for Industry 4.0 (I4.0 MM) with influencing factors is designed to address maturity issues in adopting Industry 4.0. Standardisation in I4.0 supports…

Abstract

Purpose

A maturity model for Industry 4.0 (I4.0 MM) with influencing factors is designed to address maturity issues in adopting Industry 4.0. Standardisation in I4.0 supports manufacturing industry transformation, forming reference architecture models (RAMs). This paper aligns key factors and maturity levels in I4.0 MMs with reputable I4.0 RAMs to enhance strategy for I4.0 transformation and implementation.

Design/methodology/approach

Three steps of alignment consist of the systematic literature review (SLR) method to study the current published high-quality I4.0 MMs, the taxonomy development of I4.0 influencing factors by adapting and implementing the categorisation of system theories and aligning I4.0 MMs with RAMs.

Findings

The study discovered that different I4.0 MMs lead to varied organisational interpretations. Challenges and insights arise when aligning I4.0 MMs with RAMs. Aligning MM levels with RAM stages is a crucial milestone in the journey toward I4.0 transformation. Evidence indicates that I4.0 MMs and RAMs often overlook the cultural domain.

Research limitations/implications

Findings contribute to the literature on aligning capabilities with implementation strategies while employing I4.0 MMs and RAMs. We use five RAMs (RAMI4.0, NIST-SME, IMSA, IVRA and IIRA), and as a common limitation in SLR, there could be a subjective bias in reading and selecting literature.

Practical implications

To fully leverage the capabilities of RAMs as part of the I4.0 implementation strategy, companies should initiate the process by undertaking a thorough needs assessment using I4.0 MMs.

Originality/value

The novelty of this paper lies in being the first to examine the alignment of I4.0 MMs with established RAMs. It offers valuable insights for improving I4.0 implementation strategies, especially for companies using both MMs and RAMs in their transformation efforts.

Details

Journal of Manufacturing Technology Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1741-038X

Keywords

Article
Publication date: 30 April 2024

Shiqing Wu, Jiahai Wang, Haibin Jiang and Weiye Xue

The purpose of this study is to explore a new assembly process planning and execution mode to realize rapid response, reduce the labor intensity of assembly workers and improve…

Abstract

Purpose

The purpose of this study is to explore a new assembly process planning and execution mode to realize rapid response, reduce the labor intensity of assembly workers and improve the assembly efficiency and quality.

Design/methodology/approach

Based on the related concepts of digital twin, this paper studies the product assembly planning in digital space, the process execution in physical space and the interaction between digital space and physical space. The assembly process planning is simulated and verified in the digital space to generate three-dimensional visual assembly process specification documents, the implementation of the assembly process specification documents in the physical space is monitored and feed back to revise the assembly process and improve the assembly quality.

Findings

Digital twin technology enhances the quality and efficiency of assembly process planning and execution system.

Originality/value

It provides a new perspective for assembly process planning and execution, the architecture, connections and data acquisition approaches of the digital twin-driven framework are proposed in this paper, which is of important theoretical values. What is more, a smart assembly workbench is developed, the specific image classification algorithms are presented in detail too, which is of some industrial application values.

Details

Robotic Intelligence and Automation, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2754-6969

Keywords

Article
Publication date: 3 October 2023

Shao-Fang Wen and Basel Katt

Security assurance evaluation (SAE) is a well-established approach for assessing the effectiveness of security measures in systems. However, one aspect that is often overlooked in…

Abstract

Purpose

Security assurance evaluation (SAE) is a well-established approach for assessing the effectiveness of security measures in systems. However, one aspect that is often overlooked in these evaluations is the assurance context in which they are conducted. This paper aims to explore the role of assurance context in system SAEs and proposes a conceptual model to integrate the assurance context into the evaluation process.

Design/methodology/approach

The conceptual model highlights the interrelationships between the various elements of the assurance context, including system boundaries, stakeholders, security concerns, regulatory compliance and assurance assumptions and regulatory compliance.

Findings

By introducing the proposed conceptual model, this research provides a framework for incorporating the assurance context into SAEs and offers insights into how it can influence the evaluation outcomes.

Originality/value

By delving into the concept of assurance context, this research seeks to shed light on how it influences the scope, methodologies and outcomes of assurance evaluations, ultimately enabling organizations to strengthen their system security postures and mitigate risks effectively.

Details

Information & Computer Security, vol. 32 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 30 April 2024

C. Bharanidharan, S. Malathi and Hariprasath Manoharan

The potential of vehicle ad hoc networks (VANETs) to improve driver and passenger safety and security has made them a hot topic in the field of intelligent transportation systems…

Abstract

Purpose

The potential of vehicle ad hoc networks (VANETs) to improve driver and passenger safety and security has made them a hot topic in the field of intelligent transportation systems (ITSs). VANETs have different characteristics and system architectures from mobile ad hoc networks (MANETs), with a primary focus on vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communication. But protecting VANETs from malicious assaults is crucial because they can undermine network security and safety.

Design/methodology/approach

The black hole attack is a well-known danger to VANETs. It occurs when a hostile node introduces phony routing tables into the network, potentially damaging it and interfering with communication. A safe ad hoc on-demand distance vector (AODV) routing protocol has been created in response to this issue. By adding cryptographic features for source and target node verification to the route request (RREQ) and route reply (RREP) packets, this protocol improves upon the original AODV routing system.

Findings

Through the use of cryptographic-based encryption and decryption techniques, the suggested method fortifies the VANET connection. In addition, other network metrics are taken into account to assess the effectiveness of the secure AODV routing protocol under black hole attacks, including packet loss, end-to-end latency, packet delivery ratio (PDR) and routing request overhead. Results from simulations using an NS-2.33 simulator show how well the suggested fix works to enhance system performance and lessen the effects of black hole assaults on VANETs.

Originality/value

All things considered, the safe AODV routing protocol provides a strong method for improving security and dependability in VANET systems, protecting against malevolent attacks and guaranteeing smooth communication between cars and infrastructure.

Details

International Journal of Intelligent Unmanned Systems, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2049-6427

Keywords

Article
Publication date: 6 December 2023

Imon Chowdhooree, Tasfin Aziz, Md. Jubaer Rashid and Meherab Hossain

Urban areas, especially in the coastal region of Bangladesh, face environmental degradation due to rapid urbanization, uncontrolled socio-economic activities and experiencing the…

Abstract

Purpose

Urban areas, especially in the coastal region of Bangladesh, face environmental degradation due to rapid urbanization, uncontrolled socio-economic activities and experiencing the adverse impacts of climate change. Nature-based solutions (NbS) as options for restoring, preserving, maintaining and elevating natural features or systems are becoming popular for reducing vulnerabilities caused either by natural hazards or human-induced activities. With this understanding, this study aims to explore the need of practicing NbS by studying the condition of a tidal canal (known as Thakurani Khal) and its peripheral areas of Mongla Port Municipality, a coastal and seaport town in Bangladesh.

Design/methodology/approach

This case study-based research uses multiple inquiries, including focus group discussions, pair-wise comparison, observation, GIS-based mapping, key informant interviews and secondary climate data review, to understand the spatial development of the area and community reactions to the changes in the urban environment.

Findings

The natural water flow of this canal is controlled by sluice gates that indirectly allowed the dweller to encroach its lands and convert the canal into a solid waste dumping area. These human-induced activities as well as the climate change-induced events (i.e. extreme heat, intensive and irregular rainfall, increased number of cyclones, etc.) have made the adjacent areas prone to waterlogging and drainage congestion. In this context, the revival of the original natural quality of the canal has been identified as an alternative to ensuring an adaptive urban environment.

Originality/value

This research highlights the importance of practicing NbS for developing urban resilience in the context of climate change.

Details

International Journal of Disaster Resilience in the Built Environment, vol. 15 no. 3
Type: Research Article
ISSN: 1759-5908

Keywords

Article
Publication date: 30 April 2024

Hafiez Sofyani and Emile Satia Darma

This study aims to examine the effect of application architecture and application efficiency on the intention to continue using Islamic bank with data security as a moderator. The…

Abstract

Purpose

This study aims to examine the effect of application architecture and application efficiency on the intention to continue using Islamic bank with data security as a moderator. The investigation was situated within the framework of a hacker attack that compromised the security of customer data at one of Indonesia’s largest Islamic bank.

Design/methodology/approach

A survey questionnaire method was used, and the sample population comprised users of Islamic bank in Indonesia. The respondents were then selected purposively with the criteria of individuals who were using mobile banking services. Furthermore, data collection in this study was carried out by distributing questionnaires online. To validate the questionnaire, consultation and validation were conducted by engaging four experts and conducting a pilot study. Hypothesis testing was performed using the structural equation modeling method based on partial least squares.

Findings

The results of the partial least square structural model assessment showed that application efficiency and data security positively influenced the intention to continue using Islamic bank, while application architecture had no effect. Furthermore, data security could not moderate the relationship between application architecture and efficiency toward the intention to continue using Islamic bank.

Practical implications

The results of this study suggested that Islamic banking practitioners must prioritize the enhancement of digital banking services, with a specific focus on improving application efficiency and ensuring robust data security. These two dimensions were critical determinants influencing the intention to continue using Islamic bank.

Originality/value

This study addressed the issue of data security as a moderator, particularly in the context of hacker attacks targeting a major Islamic bank in Indonesia. Furthermore, this current report expounded on the study conducted by Mir et al. (2022) by introducing novel dimensions to the e-service quality of internet banking.

Details

Journal of Islamic Marketing, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1759-0833

Keywords

Article
Publication date: 29 April 2024

Giovanna Culot, Guido Orzes, Marco Sartor and Guido Nassimbeni

This study aims to analyze the factors that drive or prevent interorganizational data sharing in the context of digital transformation (DT). Data sharing appears as a precondition…

Abstract

Purpose

This study aims to analyze the factors that drive or prevent interorganizational data sharing in the context of digital transformation (DT). Data sharing appears as a precondition for companies to capture emerging opportunities in supply chain management and for product-related servitization; however, there are ongoing concerns, and data are often perceived as the “new oil.” It is thus important to gain a better understanding of the determinants of firms’ decisions.

Design/methodology/approach

The authors develop an embedded case study analysis involving 16 firms within an extended supply network in the automotive industry. The authors focus on the peculiarities of the new context, as opposed to elements highlighted by research prior to the advent of the latest technologies. Abductive reasoning is applied to the theoretical foundations of the resource-based view, resource dependence theory and the complex adaptive systems perspective.

Findings

Data sharing is largely underpinned by factors identified prior to DT, such as data specificity, dependence dynamics and protection mechanisms and the dynamism of the business context. DT, however, can influence the extent of data sharing. New factors concern complementarities whenever data are pooled from different sources and digital platforms, as well as different forms of data ownership protection.

Originality/value

This study stresses that data sharing in the context of DT can be explained through established theoretical lenses, providing the integration of elements accounting for new technological opportunities.

Details

Supply Chain Management: An International Journal, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1359-8546

Keywords

Article
Publication date: 12 March 2024

Utkarsh Shrivastava, Bernard Han, Ying Zhou and Muhammad Razi

Sharing patient health information (PHI) among hospitals has been much slower than the adoption of health record systems. This paper aims to investigate if privacy regulation (PR…

Abstract

Purpose

Sharing patient health information (PHI) among hospitals has been much slower than the adoption of health record systems. This paper aims to investigate if privacy regulation (PR) or security measures (SMs) influence hospitals’ use of health information exchange (HIE) to share PHI with other providers (e.g. physicians, labs, hospitals). The study specifically focuses on how multiple PRs can impede and a strong national security infrastructure (NSI) can support HIE.

Design/methodology/approach

The study uses secondary data from a multi-national and multi-hospital survey administered by the European Union. The multi-level structure of the cross-sectional panel data is used to test the influence of both hospital-level (e.g. PR) and national-level variables (e.g. NSI) on HIE. A total of nine types of HIE, three types of PRs, nine SMs and other relevant control variables are considered. This study uses a two-level random intercept generalized linear model to test the hypothesis proposed in the study.

Findings

The study finds that national-level PRs (NLPR) have the strongest positive influence on HIE in comparison to regional (RLPR) and hospital-level (HLPR) PRs. Moreover, the study finds evidence that the presence of RLPR and HLPR, on average, decreases the positive impact of NLPR by 264%. The SMs also have a significant and positive impact on HIE. Adoption of an additional SM can increase the odds of engaging in a certain type of HIE between 21% and 61%. On the other hand, a strong NSI can also amplify the positive impact of SM on certain types of HIE.

Originality/value

This study extends prior research on the role of PRs in enabling HIE by considering the complexities brought up by adopting multiple PRs. NLPRs have the strongest impact on HIE in comparison to RLPRs or HLPRs. Moreover, public infrastructure initiatives such as those related to secure communications can also complement SMs adopted by the providers by encouraging HIE.

Details

Digital Policy, Regulation and Governance, vol. 26 no. 3
Type: Research Article
ISSN: 2398-5038

Keywords

Article
Publication date: 26 January 2023

Afiqah R. Radzi, Nur Farhana Azmi, Syahrul Nizam Kamaruzzaman, Rahimi A. Rahman and Eleni Papadonikolaki

Digital twin (DT) and building information modeling (BIM) are interconnected in some ways. However, there has been some misconception about how DT differs from BIM. As a result…

Abstract

Purpose

Digital twin (DT) and building information modeling (BIM) are interconnected in some ways. However, there has been some misconception about how DT differs from BIM. As a result, industry professionals reject DT even in BIM-based construction projects due to reluctance to innovate. Furthermore, researchers have repeatedly developed tools and techniques with the same goals using DT and BIM to assist practitioners in construction projects. Therefore, this study aims to assist industry professionals and researchers in understanding the relationship between DT and BIM and synthesize existing works on DT and BIM.

Design/methodology/approach

A systematic review was conducted on published articles related to DT and BIM. A total record of 54 journal articles were identified and analyzed.

Findings

The analysis of the selected journal articles revealed four types of relationships between DT and BIM: BIM is a subset of DT, DT is a subset of BIM, BIM is DT, and no relationship between BIM and DT. The existing research on DT and BIM in construction projects targets improvements in five areas: planning, design, construction, operations and maintenance, and decommissioning. In addition, several areas have emerged, such as developing geo-referencing approaches for infrastructure projects, applying the proposed methodology to other construction geometries and creating 3D visualization using color schemes.

Originality/value

This study contributed to the existing body of knowledge by overviewing existing research related to DT and BIM in construction projects. Also, it reveals research gaps in the body of knowledge to point out directions for future research.

Details

Construction Innovation , vol. 24 no. 3
Type: Research Article
ISSN: 1471-4175

Keywords

1 – 10 of 310