Search results

1 – 10 of 10
Article
Publication date: 22 December 2023

Ali Ahmed Albinali, Russell Lock and Iain Phillips

This study aims to look at challenges that hinder small- and medium-sized enterprises (SMEs) from using open data (OD). The research gaps identified are then used to propose a…

Abstract

Purpose

This study aims to look at challenges that hinder small- and medium-sized enterprises (SMEs) from using open data (OD). The research gaps identified are then used to propose a next generation of OD platform (ODP+).

Design/methodology/approach

This study proposes a more effective platform for SMEs called ODP+. A proof of concept was implemented by using modern techniques and technologies, with a pilot conducted among selected SMEs and government employees to test the approach’s viability.

Findings

The findings identify current OD platforms generally, and in Gulf Cooperation Council (GCC) countries, they encounter several difficulties, including that the data sets are complex to understand and determine their potential for reuse. The application of big data analytics in mitigating the identified challenges is demonstrated through the artefacts that have been developed.

Research limitations/implications

This paper discusses several challenges that must be addressed to ensure that OD is accessible, helpful and of high quality in the future when planning and implementing OD initiatives.

Practical implications

The proposed ODP+ integrates social network data, SME data sets and government databases. It will give SMEs a platform for combining data from government agencies, third parties and social networks to carry out complex analytical scenarios or build the needed application using artificial intelligence.

Social implications

The findings promote the potential future utilisation of OD and suggest ways to give users access to knowledge and features.

Originality/value

To the best of the authors’ knowledge, no study provides extensive research about OD in Qatar or GCC. Further, the proposed ODP+ is a new platform that allows SMEs to run natural language data analytics queries.

Details

Transforming Government: People, Process and Policy, vol. 18 no. 2
Type: Research Article
ISSN: 1750-6166

Keywords

Article
Publication date: 12 January 2024

Mathew B. Fukuzawa, Brandon M. McConnell, Michael G. Kay, Kristin A. Thoney-Barletta and Donald P. Warsing

Demonstrate proof-of-concept for conducting NFL Draft trades on a blockchain network using smart contracts.

Abstract

Purpose

Demonstrate proof-of-concept for conducting NFL Draft trades on a blockchain network using smart contracts.

Design/methodology/approach

Using Ethereum smart contracts, the authors model several types of draft trades between teams. An example scenario is used to demonstrate contract interaction and draft results.

Findings

The authors show the feasibility of conducting draft-day trades using smart contracts. The entire negotiation process, including side deals, can be conducted digitally.

Research limitations/implications

Further work is required to incorporate the full-scale depth required to integrate the draft trading process into a decentralized user platform and experience.

Practical implications

Cutting time for the trade negotiation process buys decision time for team decision-makers. Gains are also made with accuracy and cost.

Social implications

Full-scale adoption may find resistance due to the level of fan involvement; the draft has evolved into an interactive experience for both fans and teams.

Originality/value

This research demonstrates the new application of smart contracts in the inter-section of sports management and blockchain technology.

Details

International Journal of Sports Marketing and Sponsorship, vol. 25 no. 2
Type: Research Article
ISSN: 1464-6668

Keywords

Open Access
Article
Publication date: 16 April 2024

Natile Nonhlanhla Cele and Sheila Kwenda

The purpose of the study is to identify cybersecurity threats that hinder the adoption of digital banking and provide sustainable strategies to combat cybersecurity risks in the…

Abstract

Purpose

The purpose of the study is to identify cybersecurity threats that hinder the adoption of digital banking and provide sustainable strategies to combat cybersecurity risks in the banking industry.

Design/methodology/approach

Systematic literature review guidelines were used to conduct a quantitative synthesis of empirical evidence regarding the impact of cybersecurity threats and risks on the adoption of digital banking.

Findings

A total of 84 studies were initially examined, and after applying the selection and eligibility criteria for this systematic review, 58 studies were included. These selected articles consistently identified identity theft, malware attacks, phishing and vishing as significant cybersecurity threats that hinder the adoption of digital banking.

Originality/value

With the country’s banking sector being new in this area, this study contributes to the scant literature on cyber security, which is mostly in need due to the myriad breaches that the industry has already suffered thus far.

Details

Journal of Financial Crime, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1359-0790

Keywords

Article
Publication date: 15 April 2024

Nanouk Verhulst, Hendrik Slabbinck, Kim Willems and Malaika Brengman

To date, to the best of the authors’ knowledge, the use of implicit measures in the service research domain is limited. This paper aims to introduce implicit measures and explain…

Abstract

Purpose

To date, to the best of the authors’ knowledge, the use of implicit measures in the service research domain is limited. This paper aims to introduce implicit measures and explain why, or for what purpose, they are worthwhile to consider; how these measures can be used; and when and where implicit measures merit the service researcher’s consideration.

Design/methodology/approach

To gain an understanding of how implicit measures could benefit service research, three promising implicit measures are discussed, namely, the implicit association test, the affect misattribution procedure and the propositional evaluation paradigm. More specifically, this paper delves into how implicit measures can support service research, focusing on three focal service topics, namely, technology, affective processes including customer experience and service employees.

Findings

This paper demonstrates how implicit measures can investigate paramount service-related subjects. Additionally, it provides essential methodological “need-to-knows” for assessing others’ work with implicit measures and/or for starting your own use of them.

Originality/value

This paper introduces when and why to consider integrating implicit measures in service research, along with a roadmap on how to get started.

Details

Journal of Services Marketing, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0887-6045

Keywords

Article
Publication date: 9 April 2024

Alexander O. Smith, Jeff Hemsley and Zhasmina Y. Tacheva

Our purpose is to reconnect memetics to information, a persistent and unclear association. Information can contribute across a span of memetic research. Its obscurity restricts…

Abstract

Purpose

Our purpose is to reconnect memetics to information, a persistent and unclear association. Information can contribute across a span of memetic research. Its obscurity restricts conversations about “information flow,” the connections between “form” and “content,” as well as many other topics. As information is involved in cultural activity, its clarification could focus memetic theories and applications.

Design/methodology/approach

Our design captures theoretical nuance in memetics by considering a long standing conceptual issue in memetics: information. A systematic review of memetics is provided by making use of the term information across literature. We additionally provide a citation analysis and close readings of what “information” means within the corpus.

Findings

Our initial corpus is narrowed to 128 pivotal memetic publications. From these publications, we provide a citation analysis of memetic studies. Theoretical directions of memetics in the informational context are outlined and developed. We outline two main discussion spaces, survey theoretical interests and describe where and when information is important to memetic discussion. We also find that there are continuities in goals which connect Dawkins’s meme with internet meme studies.

Originality/value

To our knowledge, this is the broadest, most inclusive review of memetics conducted, making use of a unique approach to studying information-oriented discourse across a corpus. In doing so, we provide information researchers areas in which they might contribute theoretical clarity in diverse memetic approaches. Additionally, we borrow the notion of “conceptual troublemakers” to contribute a corpus collection strategy which might be valuable for future literature reviews with conceptual difficulties arising from interdisciplinary study.

Details

Journal of Documentation, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0022-0418

Keywords

Article
Publication date: 16 April 2024

Amir Schreiber and Ilan Schreiber

In the modern digital realm, while artificial intelligence (AI) technologies pave the way for unprecedented opportunities, they also give rise to intricate cybersecurity issues…

Abstract

Purpose

In the modern digital realm, while artificial intelligence (AI) technologies pave the way for unprecedented opportunities, they also give rise to intricate cybersecurity issues, including threats like deepfakes and unanticipated AI-induced risks. This study aims to address the insufficient exploration of AI cybersecurity awareness in the current literature.

Design/methodology/approach

Using in-depth surveys across varied sectors (N = 150), the authors analyzed the correlation between the absence of AI risk content in organizational cybersecurity awareness programs and its impact on employee awareness.

Findings

A significant AI-risk knowledge void was observed among users: despite frequent interaction with AI tools, a majority remain unaware of specialized AI threats. A pronounced knowledge difference existed between those that are trained in AI risks and those who are not, more apparent among non-technical personnel and sectors managing sensitive information.

Research limitations/implications

This study paves the way for thorough research, allowing for refinement of awareness initiatives tailored to distinct industries.

Practical implications

It is imperative for organizations to emphasize AI risk training, especially among non-technical staff. Industries handling sensitive data should be at the forefront.

Social implications

Ensuring employees are aware of AI-related threats can lead to a safer digital environment for both organizations and society at large, given the pervasive nature of AI in everyday life.

Originality/value

Unlike most of the papers about AI risks, the authors do not trust subjective data from second hand papers, but use objective authentic data from the authors’ own up-to-date anonymous survey.

Details

Information & Computer Security, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2056-4961

Keywords

Open Access
Article
Publication date: 13 March 2024

Tjaša Redek and Uroš Godnov

The Internet has changed consumer decision-making and influenced business behaviour. User-generated product information is abundant and readily available. This paper argues that…

Abstract

Purpose

The Internet has changed consumer decision-making and influenced business behaviour. User-generated product information is abundant and readily available. This paper argues that user-generated content can be efficiently utilised for business intelligence using data science and develops an approach to demonstrate the methods and benefits of the different techniques.

Design/methodology/approach

Using Python Selenium, Beautiful Soup and various text mining approaches in R to access, retrieve and analyse user-generated content, we argue that (1) companies can extract information about the product attributes that matter most to consumers and (2) user-generated reviews enable the use of text mining results in combination with other demographic and statistical information (e.g. ratings) as an efficient input for competitive analysis.

Findings

The paper shows that combining different types of data (textual and numerical data) and applying and combining different methods can provide organisations with important business information and improve business performance.

Research limitations/implications

The paper shows that combining different types of data (textual and numerical data) and applying and combining different methods can provide organisations with important business information and improve business performance.

Originality/value

The study makes several contributions to the marketing and management literature, mainly by illustrating the methodological advantages of text mining and accompanying statistical analysis, the different types of distilled information and their use in decision-making.

Details

Kybernetes, vol. 53 no. 13
Type: Research Article
ISSN: 0368-492X

Keywords

Article
Publication date: 20 February 2023

Zakaria Sakyoud, Abdessadek Aaroud and Khalid Akodadi

The main goal of this research work is the optimization of the purchasing business process in the Moroccan public sector in terms of transparency and budgetary optimization. The…

Abstract

Purpose

The main goal of this research work is the optimization of the purchasing business process in the Moroccan public sector in terms of transparency and budgetary optimization. The authors have worked on the public university as an implementation field.

Design/methodology/approach

The design of the research work followed the design science research (DSR) methodology for information systems. DSR is a research paradigm wherein a designer answers questions relevant to human problems through the creation of innovative artifacts, thereby contributing new knowledge to the body of scientific evidence. The authors have adopted a techno-functional approach. The technical part consists of the development of an intelligent recommendation system that supports the choice of optimal information technology (IT) equipment for decision-makers. This intelligent recommendation system relies on a set of functional and business concepts, namely the Moroccan normative laws and Control Objectives for Information and Related Technology's (COBIT) guidelines in information system governance.

Findings

The modeling of business processes in public universities is established using business process model and notation (BPMN) in accordance with official regulations. The set of BPMN models constitute a powerful repository not only for business process execution but also for further optimization. Governance generally aims to reduce budgetary wastes, and the authors' recommendation system demonstrates a technical and methodological approach enabling this feature. Implementation of artificial intelligence techniques can bring great value in terms of transparency and fluidity in purchasing business process execution.

Research limitations/implications

Business limitations: First, the proposed system was modeled to handle one type products, which are computer-related equipment. Hence, the authors intend to extend the model to other types of products in future works. Conversely, the system proposes optimal purchasing order and assumes that decision makers will rely on this optimal purchasing order to choose between offers. In fact, as a perspective, the authors plan to work on a complete automation of the workflow to also include vendor selection and offer validation. Technical limitations: Natural language processing (NLP) is a widely used sentiment analysis (SA) technique that enabled the authors to validate the proposed system. Even working on samples of datasets, the authors noticed NLP dependency on huge computing power. The authors intend to experiment with learning and knowledge-based SA and assess the' computing power consumption and accuracy of the analysis compared to NLP. Another technical limitation is related to the web scraping technique; in fact, the users' reviews are crucial for the authors' system. To guarantee timeliness and reliable reviews, the system has to look automatically in websites, which confront the authors with the limitations of the web scraping like the permanent changing of website structure and scraping restrictions.

Practical implications

The modeling of business processes in public universities is established using BPMN in accordance with official regulations. The set of BPMN models constitute a powerful repository not only for business process execution but also for further optimization. Governance generally aims to reduce budgetary wastes, and the authors' recommendation system demonstrates a technical and methodological approach enabling this feature.

Originality/value

The adopted techno-functional approach enabled the authors to bring information system governance from a highly abstract level to a practical implementation where the theoretical best practices and guidelines are transformed to a tangible application.

Details

Kybernetes, vol. 53 no. 5
Type: Research Article
ISSN: 0368-492X

Keywords

Article
Publication date: 26 May 2022

Ismail Abiodun Sulaimon, Hafiz Alaka, Razak Olu-Ajayi, Mubashir Ahmad, Saheed Ajayi and Abdul Hye

Road traffic emissions are generally believed to contribute immensely to air pollution, but the effect of road traffic data sets on air quality (AQ) predictions has not been fully…

266

Abstract

Purpose

Road traffic emissions are generally believed to contribute immensely to air pollution, but the effect of road traffic data sets on air quality (AQ) predictions has not been fully investigated. This paper aims to investigate the effects traffic data set have on the performance of machine learning (ML) predictive models in AQ prediction.

Design/methodology/approach

To achieve this, the authors have set up an experiment with the control data set having only the AQ data set and meteorological (Met) data set, while the experimental data set is made up of the AQ data set, Met data set and traffic data set. Several ML models (such as extra trees regressor, eXtreme gradient boosting regressor, random forest regressor, K-neighbors regressor and two others) were trained, tested and compared on these individual combinations of data sets to predict the volume of PM2.5, PM10, NO2 and O3 in the atmosphere at various times of the day.

Findings

The result obtained showed that various ML algorithms react differently to the traffic data set despite generally contributing to the performance improvement of all the ML algorithms considered in this study by at least 20% and an error reduction of at least 18.97%.

Research limitations/implications

This research is limited in terms of the study area, and the result cannot be generalized outside of the UK as some of the inherent conditions may not be similar elsewhere. Additionally, only the ML algorithms commonly used in literature are considered in this research, therefore, leaving out a few other ML algorithms.

Practical implications

This study reinforces the belief that the traffic data set has a significant effect on improving the performance of air pollution ML prediction models. Hence, there is an indication that ML algorithms behave differently when trained with a form of traffic data set in the development of an AQ prediction model. This implies that developers and researchers in AQ prediction need to identify the ML algorithms that behave in their best interest before implementation.

Originality/value

The result of this study will enable researchers to focus more on algorithms of benefit when using traffic data sets in AQ prediction.

Details

Journal of Engineering, Design and Technology , vol. 22 no. 3
Type: Research Article
ISSN: 1726-0531

Keywords

Article
Publication date: 29 April 2022

Nathalia Rose Silva da Purificação, Vinícius Barbosa Henrique, Amilton Amorim, Andrea Carneiro and Guilherme Henrique Barros de Souza

The purpose of the study is to compare methodologies for mapping a historic building, with image capture by smartphones and drones, using photogrammetric techniques for…

Abstract

Purpose

The purpose of the study is to compare methodologies for mapping a historic building, with image capture by smartphones and drones, using photogrammetric techniques for three-dimensional (3D) modeling of the structure. Processes and products are also analyzed, as well as possibilities for storing and visualizing data for structuring a cadastre of historical and artistic heritage are studied.

Design/methodology/approach

For mapping with smartphones, the overlapping of photographs was guaranteed, with data acquisition using three different cameras, on the same date as the aerial survey. The models were made from different combinations of camera use. For storage, a conceptual model based on ISO 19.152:2012 is proposed, which was implemented in the MongoDB, resulting in a database for storage. The visualization was carried out on the Cesium ion platform.

Findings

The results indicate that the terrestrial 3D reconstruction using smartphones is an efficient alternative to the historical and artistic cadastre, presenting texture quality superior to the aerial survey in a shorter production time. When dealing with the conceptual model, the LADM (Land Administration Domain Model) standardization guarantees interoperability and facilitates data exchange. In addition, it proved to be flexible for the creation of thematic profiles, supporting their effective storage. The insertion of data in the visualization platform was simple and effective, and it even generated sharing links for visualization of the models.

Originality/value

The study analyses a low-cost method with the use of easily accessible devices, with a combination of methodologies and applied techniques. The data storage and visualization method is also simple and flexible, suitable for application in the cadastre of historical heritage.

Details

International Journal of Building Pathology and Adaptation, vol. 42 no. 2
Type: Research Article
ISSN: 2398-4708

Keywords

1 – 10 of 10