Search results

1 – 10 of 51
Content available
Article
Publication date: 28 June 2023

Javaid Ahmad Wani, Taseef Ayub Sofi, Ishrat Ayub Sofi and Shabir Ahmad Ganaie

Open-access repositories (OARs) are essential for openly disseminating intellectual knowledge on the internet and providing free access to it. The current study aims to evaluate…

Abstract

Purpose

Open-access repositories (OARs) are essential for openly disseminating intellectual knowledge on the internet and providing free access to it. The current study aims to evaluate the growth and development of OARs in the field of technology by investigating several characteristics such as coverage, OA policies, software type, content type, yearly growth, repository type and geographic contribution.

Design/methodology/approach

The directory of OARs acts as the source for data harvesting, which provides a quality-assured list of OARs across the globe.

Findings

The study found that 125 nations contributed a total of 4,045 repositories in the field of research, with the USA leading the list with the most repositories. Maximum repositories were operated by institutions having multidisciplinary approaches. The DSpace and Eprints were the preferred software types for repositories. The preferred upload content by contributors was “research articles” and “electronic thesis and dissertations”.

Research limitations/implications

The study is limited to the subject area technology as listed in OpenDOAR; therefore, the results may differ in other subject areas.

Practical implications

The work can benefit researchers across disciplines and, interested researchers can take this study as a base for evaluating online repositories. Moreover, policymakers and repository managers could also get benefitted from this study.

Originality/value

The study is the first of its kind, to the best of the authors’ knowledge, to investigate the repositories of subject technology in the open-access platform.

Details

Information Discovery and Delivery, vol. 52 no. 2
Type: Research Article
ISSN: 2398-6247

Keywords

Open Access
Article
Publication date: 1 March 2022

Elisabetta Colucci, Francesca Matrone, Francesca Noardo, Vanessa Assumma, Giulia Datola, Federica Appiotti, Marta Bottero, Filiberto Chiabrando, Patrizia Lombardi, Massimo Migliorini, Enrico Rinaldi, Antonia Spanò and Andrea Lingua

The study, within the Increasing Resilience of Cultural Heritage (ResCult) project, aims to support civil protection to prevent, lessen and mitigate disasters impacts on cultural…

2076

Abstract

Purpose

The study, within the Increasing Resilience of Cultural Heritage (ResCult) project, aims to support civil protection to prevent, lessen and mitigate disasters impacts on cultural heritage using a unique standardised-3D geographical information system (GIS), including both heritage and risk and hazard information.

Design/methodology/approach

A top-down approach, starting from existing standards (an INSPIRE extension integrated with other parts from the standardised and shared structure), was completed with a bottom-up integration according to current requirements for disaster prevention procedures and risk analyses. The results were validated and tested in case studies (differentiated concerning the hazard and type of protected heritage) and refined during user forums.

Findings

Besides the ensuing reusable database structure, the filling with case studies data underlined the tough challenges and allowed proposing a sample of workflows and possible guidelines. The interfaces are provided to use the obtained knowledge base.

Originality/value

The increasing number of natural disasters could severely damage the cultural heritage, causing permanent damage to movable and immovable assets and tangible and intangible heritage. The study provides an original tool properly relating the (spatial) information regarding cultural heritage and the risk factors in a unique archive as a standard-based European tool to cope with these frequent losses, preventing risk.

Details

Journal of Cultural Heritage Management and Sustainable Development, vol. 14 no. 2
Type: Research Article
ISSN: 2044-1266

Keywords

Article
Publication date: 5 April 2024

Lida Haghnegahdar, Sameehan S. Joshi, Rohith Yanambaka Venkata, Daniel A. Riley and Narendra B. Dahotre

Additive manufacturing also known as 3D printing is an evolving advanced manufacturing technology critical for the new era of complex machinery and operating systems…

19

Abstract

Purpose

Additive manufacturing also known as 3D printing is an evolving advanced manufacturing technology critical for the new era of complex machinery and operating systems. Manufacturing systems are increasingly faced with risk of attacks not only by traditional malicious actors such as hackers and cyber-criminals but also by some competitors and organizations engaged in corporate espionage. This paper aims to elaborate a plausible risk practice of designing and demonstrate a case study for the compromised-based malicious for polymer 3D printing system.

Design/methodology/approach

This study assumes conditions when a machine was compromised and evaluates the effect of post compromised attack by studying its effects on tensile dog bone specimens as the printed object. The designed algorithm removed predetermined specific number of layers from the tensile samples. The samples were visually identical in terms of external physical dimensions even after removal of the layers. Samples were examined nondestructively for density. Additionally, destructive uniaxial tensile tests were carried out on the modified samples and compared to the unmodified sample as a control for various mechanical properties. It is worth noting that the current approach was adapted for illustrating the impact of cyber altercations on properties of additively produced parts in a quantitative manner. It concurrently pointed towards the vulnerabilities of advanced manufacturing systems and a need for designing robust mitigation/defense mechanism against the cyber altercations.

Findings

Density, Young’s modulus and maximum strength steadily decreased with an increase in the number of missing layers, whereas a no clear trend was observed in the case of % elongation. Post tensile test observations of the sample cross-sections confirmed the successful removal of the layers from the samples by the designed method. As a result, the current work presented a cyber-attack model and its quantitative implications on the mechanical properties of 3D printed objects.

Originality/value

To the best of the authors’ knowledge, this is the original work from the team. It is currently not under consideration for publication in any other avenue. The paper provides quantitative approach of realizing impact of cyber intrusions on deteriorated performance of additively manufactured products. It also enlists important intrusion mechanisms relevant to additive manufacturing.

Details

Rapid Prototyping Journal, vol. 30 no. 4
Type: Research Article
ISSN: 1355-2546

Keywords

Open Access
Article
Publication date: 8 February 2024

Joseph F. Hair, Pratyush N. Sharma, Marko Sarstedt, Christian M. Ringle and Benjamin D. Liengaard

The purpose of this paper is to assess the appropriateness of equal weights estimation (sumscores) and the application of the composite equivalence index (CEI) vis-à-vis

2691

Abstract

Purpose

The purpose of this paper is to assess the appropriateness of equal weights estimation (sumscores) and the application of the composite equivalence index (CEI) vis-à-vis differentiated indicator weights produced by partial least squares structural equation modeling (PLS-SEM).

Design/methodology/approach

The authors rely on prior literature as well as empirical illustrations and a simulation study to assess the efficacy of equal weights estimation and the CEI.

Findings

The results show that the CEI lacks discriminatory power, and its use can lead to major differences in structural model estimates, conceals measurement model issues and almost always leads to inferior out-of-sample predictive accuracy compared to differentiated weights produced by PLS-SEM.

Research limitations/implications

In light of its manifold conceptual and empirical limitations, the authors advise against the use of the CEI. Its adoption and the routine use of equal weights estimation could adversely affect the validity of measurement and structural model results and understate structural model predictive accuracy. Although this study shows that the CEI is an unsuitable metric to decide between equal weights and differentiated weights, it does not propose another means for such a comparison.

Practical implications

The results suggest that researchers and practitioners should prefer differentiated indicator weights such as those produced by PLS-SEM over equal weights.

Originality/value

To the best of the authors’ knowledge, this study is the first to provide a comprehensive assessment of the CEI’s usefulness. The results provide guidance for researchers considering using equal indicator weights instead of PLS-SEM-based weighted indicators.

Details

European Journal of Marketing, vol. 58 no. 13
Type: Research Article
ISSN: 0309-0566

Keywords

Open Access
Article
Publication date: 28 April 2022

Manuel Pedro Rodríguez Bolívar and Laura Alcaide Muñoz

This study aims to conduct performance and clustering analyses with the help of Digital Government Reference Library (DGRL) v16.6 database examining the role of emerging…

2185

Abstract

Purpose

This study aims to conduct performance and clustering analyses with the help of Digital Government Reference Library (DGRL) v16.6 database examining the role of emerging technologies (ETs) in public services delivery.

Design/methodology/approach

VOSviewer and SciMAT techniques were used for clustering and mapping the use of ETs in the public services delivery. Collecting documents from the DGRL v16.6 database, the paper uses text mining analysis for identifying key terms and trends in e-Government research regarding ETs and public services.

Findings

The analysis indicates that all ETs are strongly linked to each other, except for blockchain technologies (due to its disruptive nature), which indicate that ETs can be, therefore, seen as accumulative knowledge. In addition, on the whole, findings identify four stages in the evolution of ETs and their application to public services: the “electronic administration” stage, the “technological baseline” stage, the “managerial” stage and the “disruptive technological” stage.

Practical implications

The output of the present research will help to orient policymakers in the implementation and use of ETs, evaluating the influence of these technologies on public services.

Social implications

The research helps researchers to track research trends and uncover new paths on ETs and its implementation in public services.

Originality/value

Recent research has focused on the need of implementing ETs for improving public services, which could help cities to improve the citizens’ quality of life in urban areas. This paper contributes to expanding the knowledge about ETs and its implementation in public services, identifying trends and networks in the research about these issues.

Details

Information Technology & People, vol. 37 no. 8
Type: Research Article
ISSN: 0959-3845

Keywords

Open Access
Article
Publication date: 23 March 2020

Hedaia-t-Allah Nabil Abd Al Ghaffar

The purpose of this paper is to try to reach the main factors that could put national security at risk as a result of government cloud computing programs.

7163

Abstract

Purpose

The purpose of this paper is to try to reach the main factors that could put national security at risk as a result of government cloud computing programs.

Design/methodology/approach

The paper adopts the analytical approach to first lay foundations of the relation between national security, cybersecurity and cloud computing, then it moves to analyze the main vulnerabilities that could affect national security in cases of government cloud computing usage.

Findings

The paper reached several findings such as the relation between cybersecurity and national security as well as a group of factors that may affect national security when governments shift to cloud computing mainly pertaining to storing data over the internet, the involvement of a third party, the lack of clear regulatory frameworks inside and between countries.

Practical implications

Governments are continuously working on developing their digital capacities to meet citizens’ demands. One of the most trending technologies adopted by governments is “cloud computing”, because of the tremendous advantages that the technology provides; such as huge cost-cutting, huge storage and computing capabilities. However, shifting to cloud computing raises a lot of security concerns.

Originality/value

The value of the paper resides in the novelty of the topic, which is a new contribution to the theoretical literature on relations between new technologies and national security. It is empirically important as well to help governments stay safe while enjoying the advantages of cloud computing.

Details

Review of Economics and Political Science, vol. 9 no. 2
Type: Research Article
ISSN: 2356-9980

Keywords

Open Access
Article
Publication date: 12 March 2024

Ákos Nagy and Noémi Krátki

This study aims to explore the ways that social enterprises (SE) create value by embedding themselves in networks through the process of social innovation (SI). The processes of…

Abstract

Purpose

This study aims to explore the ways that social enterprises (SE) create value by embedding themselves in networks through the process of social innovation (SI). The processes of achieving common social missions were studied through selected organizations using an open approach to SI. Novel operational structures as well as unique forms of created value were explored.

Design/methodology/approach

Two organizations embedded in local and international networks were studied and were chosen due to their SI profiles. The study was based on qualitative exploratory research. In-depth analysis was conducted through interviews, open discussions, document analysis as well as personal observation to understand the dynamic interrelatedness of the main factors influencing success of SI ventures.

Findings

This paper identified the role of SI in SEs embedded in networks. Furthermore, the social value creation processes of these organizations as well as the value they create were explored. Based on the findings, SI is rooted in the personality of the included members of the network. The tools of collaboration are platforms that connect the network members to each other. The embedded organizations apply the concept of community sharing with the aim of social value creation.

Research limitations/implications

By focusing mainly on system design principles, the sample consists of mainly those at the core of organizations in facilitator roles, leaving peripheral actor perceptions to be determined by secondhand observations.

Originality/value

While providing a general summary of factors influencing SI activities from extent literature, the paper mainly contributes by providing deeper insight into complex models of SI practices used by SEs. The paper further contributes to popularizing the growing role of SI activities in SEs.

Details

Social Enterprise Journal, vol. 20 no. 3
Type: Research Article
ISSN: 1750-8614

Keywords

Article
Publication date: 21 February 2024

Amruta Rout, Golak Bihari Mahanta, Bibhuti Bhusan Biswal, Renin Francy T., Sri Vardhan Raj and Deepak B.B.V.L.

The purpose of this study is to plan and develop a cost-effective health-care robot for assisting and observing the patients in an accurate and effective way during pandemic…

98

Abstract

Purpose

The purpose of this study is to plan and develop a cost-effective health-care robot for assisting and observing the patients in an accurate and effective way during pandemic situation like COVID-19. The purposed research work can help in better management of pandemic situations in rural areas as well as developing countries where medical facility is not easily available.

Design/methodology/approach

It becomes very difficult for the medical staff to have a continuous check on patient’s condition in terms of symptoms and critical parameters during pandemic situations. For dealing with these situations, a service mobile robot with multiple sensors for measuring patients bodily indicators has been proposed and the prototype for the same has been developed that can monitor and aid the patient using the robotic arm. The fuzzy controller has also been incorporated with the mobile robot through which decisions on patient monitoring can be taken automatically. Mamdani implication method has been utilized for formulating mathematical expression of M number of “if and then condition based rules” with defined input Xj (j = 1, 2, ………. s), and output yi. The inputs and output variables are formed by the membership functions µAij(xj) and µCi(yi) to execute the Fuzzy Inference System controller. Here, Aij and Ci are the developed fuzzy sets.

Findings

The fuzzy-based prediction model has been tested with the output of medicines for the initial 27 runs and was validated by the correlation of predicted and actual values. The correlation coefficient has been found to be 0.989 with a mean square error value of 0.000174, signifying a strong relationship between the predicted values and the actual values. The proposed research work can handle multiple tasks like online consulting, continuous patient condition monitoring in general wards and ICUs, telemedicine services, hospital waste disposal and providing service to patients at regular time intervals.

Originality/value

The novelty of the proposed research work lies in the integration of artificial intelligence techniques like fuzzy logic with the multi-sensor-based service robot for easy decision-making and continuous patient monitoring in hospitals in rural areas and to reduce the work stress on medical staff during pandemic situation.

Details

Robotic Intelligence and Automation, vol. 44 no. 1
Type: Research Article
ISSN: 2754-6969

Keywords

Article
Publication date: 7 December 2022

Peyman Jafary, Davood Shojaei, Abbas Rajabifard and Tuan Ngo

Building information modeling (BIM) is a striking development in the architecture, engineering and construction (AEC) industry, which provides in-depth information on different…

Abstract

Purpose

Building information modeling (BIM) is a striking development in the architecture, engineering and construction (AEC) industry, which provides in-depth information on different stages of the building lifecycle. Real estate valuation, as a fully interconnected field with the AEC industry, can benefit from 3D technical achievements in BIM technologies. Some studies have attempted to use BIM for real estate valuation procedures. However, there is still a limited understanding of appropriate mechanisms to utilize BIM for valuation purposes and the consequent impact that BIM can have on decreasing the existing uncertainties in the valuation methods. Therefore, the paper aims to analyze the literature on BIM for real estate valuation practices.

Design/methodology/approach

This paper presents a systematic review to analyze existing utilizations of BIM for real estate valuation practices, discovers the challenges, limitations and gaps of the current applications and presents potential domains for future investigations. Research was conducted on the Web of Science, Scopus and Google Scholar databases to find relevant references that could contribute to the study. A total of 52 publications including journal papers, conference papers and proceedings, book chapters and PhD and master's theses were identified and thoroughly reviewed. There was no limitation on the starting date of research, but the end date was May 2022.

Findings

Four domains of application have been identified: (1) developing machine learning-based valuation models using the variables that could directly be captured through BIM and industry foundation classes (IFC) data instances of building objects and their attributes; (2) evaluating the capacity of 3D factors extractable from BIM and 3D GIS in increasing the accuracy of existing valuation models; (3) employing BIM for accurate estimation of components of cost approach-based valuation practices; and (4) extraction of useful visual features for real estate valuation from BIM representations instead of 2D images through deep learning and computer vision.

Originality/value

This paper contributes to research efforts on utilization of 3D modeling in real estate valuation practices. In this regard, this paper presents a broad overview of the current applications of BIM for valuation procedures and provides potential ways forward for future investigations.

Details

Engineering, Construction and Architectural Management, vol. 31 no. 4
Type: Research Article
ISSN: 0969-9988

Keywords

Article
Publication date: 18 July 2023

Karrar Khalaf Jabbar Allami, Faozi A. Almaqtari, Hamood Mohammed Al-Hattami and Ritu Sapra

This study aims to investigate the factors associated with the intention to use information technology in audit (ITIA) in Iraq.

Abstract

Purpose

This study aims to investigate the factors associated with the intention to use information technology in audit (ITIA) in Iraq.

Design/methodology/approach

The study uses a quantitative approach based on a questionnaire survey of 186 respondents. The study population includes respondents who are board members, senior executives, internal auditors and information technology (IT) assistants in various Iraqi organizations from different sectors. Structural equation modeling has been used to estimate the results.

Findings

The findings exhibit that most auditors in Iraq use basic IT software. However, among several specialized and advanced IT audit software packages, only generalized audit software is used by about 20%. The results also indicate that social factors significantly and positively impact auditors’ and practitioners’ perceptions of ITIA use. Moreover, the results reveal that companies and auditors who use or audit complex accounting systems perceive higher benefits and intent to adopt ITIA. However, the results report that organizational support, professional support, competency and IT education have an insignificant effect on ITIA adoption.

Originality/value

The originality of the present research lies in several aspects. First, the research study focuses specifically on Iraq, which is an emerging and less developed country influenced by social and economic. This research context provides a unique perspective and contributes to the understanding of ITIA adoption in less developed countries. The study investigates how external factors, including social and external pressure and the support of government professional bodies, affect the adoption of ITIA. Further, it assesses the influence of firms’ specific factors such as management support, level of competency and complexity of accounting information systems. Second, the study uses a quantitative approach with a questionnaire survey from various Iraqi organizations and sectors. The specific sample composition adds originality by capturing insights from different levels of organizational hierarchy and diverse professional backgrounds. Third, the findings shed light on the current IT usage in auditing practices in Iraq, highlighting that most auditors use basic IT software and the limited adoption of specialized IT audit software packages. Finally, the study’s originality is also reflected in its contribution to expanding knowledge on the perceived benefits and challenges associated with ITIA adoption in less developed countries. By emphasizing the need for broader awareness of emerging technology-enabled auditing software and considering the unique characteristics of less developed countries, the research provides valuable insights and implications for practitioners, policymakers and researchers.

Details

Information Discovery and Delivery, vol. 52 no. 2
Type: Research Article
ISSN: 2398-6247

Keywords

Access

Year

Last month (51)

Content type

Article (51)
1 – 10 of 51