Search results
1 – 10 of 76Hitesh Sharma, Praveen Ranjan Srivastava, Sajjad M. Jasimuddin, Zuopeng Justin Zhang and Ikram Jebabli
This study aims to provide a comprehensive analysis of the current privacy concerns in the tourism industry by uncovering the key factors leading to such concerns (i.e. smart…
Abstract
Purpose
This study aims to provide a comprehensive analysis of the current privacy concerns in the tourism industry by uncovering the key factors leading to such concerns (i.e. smart public services, cyber security issues, consumer behaviour and governance). Using papers from multiple sources, the relationship between technology advancements and tourist’s privacy concerns has been established.
Design/methodology/approach
This study adopted a machine learning-based systematic literature review approach to find out the clusters. The study analysed 68 papers using the topic modelling approach. A four-cluster solution was considered to be most representative of the extant literature identified using bibliographic coupling. Finally, content analysis of the selected literature has been performed.
Findings
This study identified four factors majorly leading to privacy concerns amid increasing technological advancements. Moreover, these factors were found to have a dyadic relationship with technological advancements. To everyone’s amazement, sustainable tourism was also found to have led to privacy concerns among tourists along with a lack of governance and cyber security issues. Furthermore, cluster-wise future research directions are provided based on the content analysis.
Originality/value
This study contributes to the literature by systematically reviewing and identifying the four dimensions leading to privacy concerns. To the best of the authors’ knowledge, the study done is the only attempt to synthesize the extant literature on tourists’ privacy concerns using an unbiased scientific approach.
目的
本研究对旅游业当前的隐私问题进行了全面分析, 以揭示导致此类担忧的关键因素(即智能公共服务、网络安全问题、消费者行为和治理)。 通过考察来自多方渠道的现有文献, 本研究确立了技术进步与游客隐私问题之间的关系。
设计/方法/途径
本研究采用基于机器学习的系统文献综述方法来找出聚类。 该研究使用主题建模方法分析了 68 篇文章。四聚类解决方案是现有文献中最具代表的 文献分类方法。最后, 本研究对所选文献进行了内容分析。
研究结果
这项研究确定了在技术进步不断增加的情况下主要导致隐私问题的四个因素。 此外, 这些因素被发现与技术进步有二元关系。 本研究还发现可持续旅游业引发了游客对隐私的担忧以及缺乏治理和网络安全问题。 此外, 通过基于内容的分析, 本研究提供了未来的聚类研究方向。
独创性
本研究对现有文献的贡献在于通过系统地文献综述和分析以确定导致隐私问题的四个维度。该研究是基于公正的科学方法综合现有游客隐私问题文献的首度尝试。
Finalidad/Objetivo
Este estudio proporciona un análisis exhaustivo de la actual preocupación por la privacidad en el sector turístico, poniendo al descubierto los factores clave que la generan (los servicios públicos inteligentes, los problemas de ciberseguridad, el comportamiento de los consumidores y la gobernanza). Gracias al uso de artículos de múltiples fuentes, se ha establecido la relación entre los avances tecnológicos y la preocupación de los turistas por la privacidad.
Diseño/Metodología/Enfoque
Este estudio adoptó un enfoque de revisión sistemática de la literatura basado en el aprendizaje automático para descubrir los conglomerados. El estudio analizó sesenta y ocho artículos utilizando el enfoque de modelización de temas. Se consideró que una solución de cuatro conglomerados era la más representativa de la literatura existente identificada mediante el acoplamiento bibliográfico. Por último, se realizó un análisis de contenido de la bibliografía seleccionada.
Hallazgos
En este estudio se identificaron cuatro factores principales que suscitan inquietud por la privacidad en medio de los crecientes avances tecnológicos. Además, se descubrió que estos factores tienen una relación diádica con dichos avances. Para sorpresa de todos, se halló que el turismo sostenible, junto con la falta de gobernanza y los problemas de ciberseguridad, también suscitan entre los turistas preocupaciones por su privacidad. Finalmente, el análisis de contenido ofrece orientaciones para futuras investigaciones.
Originalidad
Este estudio contribuye a la literatura haciendo una revisión sistemática e identificando las cuatro dimensiones que conducen a la preocupación por la privacidad. Este estudio es el único intento de sintetizar la bibliografía existente sobre la preocupación de los turistas por su privacidad utilizando un enfoque científico imparcial.
Details
Keywords
Khurram Shahzad, Shakeel Ahmad Khan and Abid Iqbal
The objectives of the study were to identify the effects of blockchain technology (BT) on the university librarians, the impact of BT on the university library services and to…
Abstract
Purpose
The objectives of the study were to identify the effects of blockchain technology (BT) on the university librarians, the impact of BT on the university library services and to reveal the challenges to adopt BT in the university libraries.
Design/methodology/approach
A systematic literature review was applied to address the objectives of the study. Around 25 studies published in peer-reviewed journals were selected to conduct the study.
Findings
The findings of the study revealed that blockchain technology (BT) has positive effects on the university librarians as it assists them in digital resources management, provision of integrated library services, effective records management and continued professional development. The study also displayed that BT has a positive impact on the university libraries through effective information management, user privacy, collaboration, technological innovation and access control. Results also revealed that technical issues, financial constraints, security problems, skill issues and sociocultural issues created challenges to adopt BT in the university libraries.
Originality/value
The study has offered theoretical implications for future investigators through the provision of innovative literature on the prospectus and challenges associated with blockchain in the context of librarianship. The study has also provided practical implications for management bodies by offering recommendations for the successful adoption of blockchain in the university libraries. Additionally, a framework has been developed to adopt BT successfully in the university libraries for the delivery of smart library services to library patrons.
Details
Keywords
Basmah Almekhled and Helen Petrie
This study investigated the attitudes and concerns of Saudi higher educational institution (HEI) academics about privacy and security in online teaching during the COVID-19…
Abstract
Purpose
This study investigated the attitudes and concerns of Saudi higher educational institution (HEI) academics about privacy and security in online teaching during the COVID-19 pandemic.
Design/methodology/approach
Online Questionnaire questionnaire was designed to explore Saudi HEI academic’s attitudes and concerns about privacy and security issues in online teaching. The questionnaire asked about attitudes and concerns held before the pandemic and since the pandemic. The questionnaire included four sections. At the beginning of the questionnaire, participants were asked what the phrase “online privacy and security” meant to them, to gain an initial understanding of what it meant to academics. A definition for what we intended for the survey was then provided: “that a person’s data, including their identity, is not accessible to anyone other than themselves and others whom they have authorised and that their computing devices work properly and are free from unauthorised interference” (based on my reading of a range of sources, e.g. Schatz et al., 2017; Steinberg, 2019; NCS; Windley, 2005). This was to ensure that participants did understand what I was asking about in subsequent sections.
Findings
This study investigated the attitudes and concerns of Saudi HEI academics about privacy and security in online teaching during the COVID-19 pandemic. The findings provide several key insights: Key aspects of online privacy and security for Saudi HEI academics: Saudi HEI academic’s notion of online privacy and security is about the protection of personal data, preventing unauthorized access to data and ensuring the confidentiality and integrity of data. This underscores the significance of robust measures to safeguard sensitive information in online teaching, but also the need to make academics aware of the other aspects of online privacy and security. Potential to improve policies and training about online privacy and security in Saudi HEIs: Although many participants were aware of the online privacy and security policies of their HEI, only a small percentage had received training in this area. Thus, there is a need to improve the development and dissemination of policies and to provide academics with appropriate training in this area and encourage them to take available training. Use of videoconferencing and chat technologies and cultural sensitivities: The study highlighted moderate levels of concern among Saudi HEI academics regarding the use of videoconferencing and online chat technologies, and their concerns about cultural factors around the use of these technologies. This emphasizes the need for online teaching and the growing use of technologies in such teaching to respect cultural norms and preferences, highlighting the importance of fostering a culturally sensitive approach to technology deployment and use. Surprising low webcam use: An unexpected finding is the low use of webcams by both academics and students during online teaching sessions, prompting a need for a deeper understanding of the dynamics surrounding webcam engagement in such sessions. This calls for a reevaluation of the effectiveness of webcam use in the teaching process and underscores the importance of exploring methods for enhancing engagement and interaction in online teaching. In summary, this paper investigated the attitudes and concerns about privacy and security in the online teaching of Saudi HEI academics during the coronavirus pandemic. The study reveals areas where further research and policy development can enhance the online teaching experience. As the education landscape continues to evolve, institutions must remain proactive in addressing the concerns of their academics while fostering a culturally sensitive approach to technology deployment.
Research limitations/implications
One limitation of this study is the relatively small qualitative data sample, despite the adequate size of the sample including 36 academics from various Saudi Arabian HEIs for quantitative analysis. It was necessary to make the most of the open-ended questions optional – participants did not have to answer about concerns if they did not want to, as we did not want to make the questionnaire too long and onerous to complete. Consequently, the number of academics responding to the open-ended questions was limited, emphasizing the need for additional data and alternative research methods to further these issues. The study was focused on investigating the concerns of HEI Saudi academics, recognizing that the attitudes and concerns of academics in other countries may differ. Furthermore, the research also includes an exploration of the changes in academic attitudes and concerns before and since the COVID-19 pandemic, which will be the subject of further data analysis.
Originality/value
This research delves into Saudi HEI academics' perceptions and concerns regarding privacy and security in online education during the COVID-19 Pandemic. Notably, it highlights the moderate priority placed on online privacy and security, the unexpectedly low usage of webcams and the potential for enhancing policies and training. The study emphasizes the necessity for comprehensive measures to protect sensitive data and the importance of tailored policies for educators. It also underscores the need for a more nuanced understanding of webcam usage dynamics, offering valuable insights for institutions aiming to improve online education and address educators' concerns amidst evolving educational landscapes.
Details
Keywords
Mikias Gugssa, Long Li, Lina Pu, Ali Gurbuz, Yu Luo and Jun Wang
Computer vision and deep learning (DL) methods have been investigated for personal protective equipment (PPE) monitoring and detection for construction workers’ safety. However…
Abstract
Purpose
Computer vision and deep learning (DL) methods have been investigated for personal protective equipment (PPE) monitoring and detection for construction workers’ safety. However, it is still challenging to implement automated safety monitoring methods in near real time or in a time-efficient manner in real construction practices. Therefore, this study developed a novel solution to enhance the time efficiency to achieve near-real-time safety glove detection and meanwhile preserve data privacy.
Design/methodology/approach
The developed method comprises two primary components: (1) transfer learning methods to detect safety gloves and (2) edge computing to improve time efficiency and data privacy. To compare the developed edge computing-based method with the currently widely used cloud computing-based methods, a comprehensive comparative analysis was conducted from both the implementation and theory perspectives, providing insights into the developed approach’s performance.
Findings
Three DL models achieved mean average precision (mAP) scores ranging from 74.92% to 84.31% for safety glove detection. The other two methods by combining object detection and classification achieved mAP as 89.91% for hand detection and 100% for glove classification. From both implementation and theory perspectives, the edge computing-based method detected gloves faster than the cloud computing-based method. The edge computing-based method achieved a detection latency of 36%–68% shorter than the cloud computing-based method in the implementation perspective. The findings highlight edge computing’s potential for near-real-time detection with improved data privacy.
Originality/value
This study implemented and evaluated DL-based safety monitoring methods on different computing infrastructures to investigate their time efficiency. This study contributes to existing knowledge by demonstrating how edge computing can be used with DL models (without sacrificing their performance) to improve PPE-glove monitoring in a time-efficient manner as well as maintain data privacy.
Details
Keywords
Charalampos Alexopoulos and Stuti Saxena
This paper aims to further the understanding of Open Government Data (OGD) adoption by the government by invoking two quantum physics theories – percolation theory and expander…
Abstract
Purpose
This paper aims to further the understanding of Open Government Data (OGD) adoption by the government by invoking two quantum physics theories – percolation theory and expander graph theory.
Design/methodology/approach
Extant research on the barriers to adoption and rollout of OGD is reviewed to drive home the research question for the present study. Both the theories are summarized, and lessons are derived therefrom for answering the research question.
Findings
The percolation theory solves the riddle of why the OGD initiatives find it difficult to seep across the hierarchical and geographical levels of any administrative division. The expander graph theory builds the understanding of the need for having networking among and within the key government personnel for bolstering the motivation and capacity building of the operational personnel linked with the OGD initiative. The theoretical understanding also aids in the implementation and institutionalization of OGD in general.
Originality/value
Intersectionality of domains for conducting research on any theme is always a need. Given the fact that there are innumerable challenges regarding the adoption of OGD by the governments across the world, the application of the two theories of quantum physics might solve the quandary in a befitting way.
Details
Keywords
Dilan Weerasooriya, K.A.T.O Ranadewa and B.A.K.S Perera
Cyber-physical systems (CPS) enable the synergistic integration of virtual models with the physical environment. This integration is gaining recognition for its potential to…
Abstract
Purpose
Cyber-physical systems (CPS) enable the synergistic integration of virtual models with the physical environment. This integration is gaining recognition for its potential to enhance construction project information management, thereby contributing to improved cost management in construction. Similarly, quantity surveyor (QS) plays a key role in construction projects by estimating and monitoring construction costs. Consequently, this research aims to explore redefining the role of QSs by integrating CPS.
Design/methodology/approach
The research adopted an interpretivism stance to collect and analyse data. Two rounds of 21 and 19 semi-structured interviews were conducted, with experts selected through heterogeneous purposive sampling. Code-based content analysis was used to analyse the data using NVivo12. MS Visio data visualisation tool was used to present the findings.
Findings
It is empirically proven the potential of CPS to facilitate nine key roles of QSs in all stages of the RIBA plan of work through the identification of 15 CPS applications and technologies. Nine key roles of QSs that CPS can facilitate were identified as preliminary estimation, measurement and quantification, contract administration, preparation of BOQ, interim valuation and payments, tender and contract documentation, cost planning, cost control and procurement advice. The study explored how adopting CPS technologies can transform traditional quantity surveying practices and enhance their value within the construction industry.
Originality/value
The findings add to the body of knowledge by redefining the role of QS through the integration of CPS for the first time and then by highlighting the usages of CPS in the construction industry rather than limiting it to a specific sector of the construction industry, as previous studies have done. This research uncovers several other research arenas on CPS as being the very first research to evaluate CPS to facilitate key roles of QSs. The findings can enhance the awareness and the practical implementation of CPS by intervening to form more partnerships among application developers and industry leaders.
Details
Keywords
Shefali Arora, Ruchi Mittal, Avinash K. Shrivastava and Shivani Bali
Deep learning (DL) is on the rise because it can make predictions and judgments based on data that is unseen. Blockchain technologies are being combined with DL frameworks in…
Abstract
Purpose
Deep learning (DL) is on the rise because it can make predictions and judgments based on data that is unseen. Blockchain technologies are being combined with DL frameworks in various industries to provide a safe and effective infrastructure. The review comprises literature that lists the most recent techniques used in the aforementioned application sectors. We examine the current research trends across several fields and evaluate the literature in terms of its advantages and disadvantages.
Design/methodology/approach
The integration of blockchain and DL has been explored in several application domains for the past five years (2018–2023). Our research is guided by five research questions, and based on these questions, we concentrate on key application domains such as the usage of Internet of Things (IoT) in several applications, healthcare and cryptocurrency price prediction. We have analyzed the main challenges and possibilities concerning blockchain technologies. We have discussed the methodologies used in the pertinent publications in these areas and contrasted the research trends during the previous five years. Additionally, we provide a comparison of the widely used blockchain frameworks that are used to create blockchain-based DL frameworks.
Findings
By responding to five research objectives, the study highlights and assesses the effectiveness of already published works using blockchain and DL. Our findings indicate that IoT applications, such as their use in smart cities and cars, healthcare and cryptocurrency, are the key areas of research. The primary focus of current research is the enhancement of existing systems, with data analysis, storage and sharing via decentralized systems being the main motivation for this integration. Amongst the various frameworks employed, Ethereum and Hyperledger are popular among researchers in the domain of IoT and healthcare, whereas Bitcoin is popular for research on cryptocurrency.
Originality/value
There is a lack of literature that summarizes the state-of-the-art methods incorporating blockchain and DL in popular domains such as healthcare, IoT and cryptocurrency price prediction. We analyze the existing research done in the past five years (2018–2023) to review the issues and emerging trends.
Details
Keywords
Mutairu Oyewale Akintunde and Halimah Odunayo Amuda
This study aimed to predict and understand the academic libraries' probability of successful adoption of blockchain within the lens of integrated technology acceptance model (TAM…
Abstract
Purpose
This study aimed to predict and understand the academic libraries' probability of successful adoption of blockchain within the lens of integrated technology acceptance model (TAM) and technology organization and environment theory (TOE) framework.
Design/methodology/approach
A mixed approach was employed to gather data from librarians (292) and system analysts (46) totaling 338 respondents. The total enumeration sampling technique was considered. Qualitative data were analyzed thematically, while quantitative data were analyzed using structural equation model (SEM).
Findings
Perceived usefulness and policy are the important factors that influence academic libraries' blockchain adoption intentions. Unlimited access to both print and electronic resources, security of users' information and easy collaboration between users and library staff were found to be the benefits of blockchain application to academic libraries' operations. Major challenges to the adoption of blockchain in academic libraries include the cost of infrastructure related to blockchain applications, privacy issues and a lack of understanding of blockchain technology among librarians.
Research limitations/implications
Future studies would need to include more relevant items to the observed variables of the independent variables that were found insignificant in this study.
Practical implications
The findings of this study will create a roadmap for government and polytechnic management on the factors that could strengthen the adoption of blockchain in the libraries.
Social implications
The outcome of this study came at a crucial moment when the majority of academic libraries in developing nations like Nigeria were skeptical about the deployment of blockchain technology in their libraries.
Originality/value
The study identified new factors that influence blockchain adoption intention.
Details
Keywords
Ahed Habib, Abdulrahman Alnaemi and Maan Habib
Earthquakes pose a significant challenge to human safety and the durability of infrastructure, highlighting the urgent need for innovative disaster management strategies. This…
Abstract
Purpose
Earthquakes pose a significant challenge to human safety and the durability of infrastructure, highlighting the urgent need for innovative disaster management strategies. This study addresses the gap in current earthquake disaster management approaches, which are often related to issues of transparency, centralization and sluggish response times. By exploring the integration of blockchain technology into seismic hazard management, the purpose of the research is to overcome these limitations by offering a novel framework for integrating blockchain technology into earthquake risk mitigation and disaster management strategies of smart cities.
Design/methodology/approach
This study develops an innovative approach to address these issues by introducing a blockchain-based seismic monitoring and automated decision support system for earthquake disaster management in smart cities. This research aims to capitalize on the benefits of blockchain technology, specifically its real-time data accessibility, decentralization and automation capabilities, to enhance earthquake disaster management. The methodology employed integrates seismic monitoring data into a blockchain framework, ensuring accurate, reliable and comprehensive information. Additionally, smart contracts are utilized to handle decision-making and enable rapid responses during earthquake disasters, offering an effective alternative to traditional approaches.
Findings
The study results highlight the system’s potential to foster reliability, decentralization and efficiency in earthquake disaster management, promoting enhanced collaboration among stakeholders and facilitating swift actions to minimize human and capital loss. This research lays the foundation for further exploration of blockchain technology’s practical applications in other disaster management contexts and its potential to transform traditional practices.
Originality/value
Current methodologies, while contributing to the reduction of earthquake-related impacts, are often hindered by limitations such as lack of transparency, centralization and slow response times. In contrast, the adoption of blockchain technology can address these challenges and offer benefits over various aspects, including decentralized control, improved security, real-time data accessibility and enhanced inter-organizational collaboration.
Details
Keywords
Rasha Abdullah Alshaye, Amr Selim Wannas and Mohamed Saeed Bakr
The search for new techniques to teach English nowadays has been more than ever. These techniques have to be interesting and enjoyable in order to lower the anxiety levels of…
Abstract
Purpose
The search for new techniques to teach English nowadays has been more than ever. These techniques have to be interesting and enjoyable in order to lower the anxiety levels of students when learning English (Bakhsh, 2016). That is why many scholars and teachers look forward to integrating technology into language teaching. Social media platforms (SMPs) are among these techniques since millions of people around the world utilize them for daily interaction. Yet, teaching English for specific purposes (ESPs) relies on learners’ needs and employs an eclectic approach in delivering its course content. For this reason, the current study reviewed articles that tackled the topic of teaching or learning ESP from SMPs so as to uncover their effect and the attitude or motivation of learners.
Design/methodology/approach
The researchers used the PRISMA flowchart model in order to identify, screen and include articles in the study.
Findings
The results revealed that SMPs are effective in teaching and learning ESP writing, speaking and vocabulary. Yet, the included studies showed that learners’ attitude toward SMPs is positive as they believe that they are motivating and interesting.
Research limitations/implications
Some aspects of social media have turned out to be beneficial in the learning process and they need further investigation from ESP practitioners and scholars.
Originality/value
According to the study, it is crystal clear that the various social networks and platforms are beneficial and helpful for improving ESP productive skills.
Details