Search results
1 – 10 of 229Manuel Pedro Rodríguez Bolívar and Laura Alcaide Muñoz
This study aims to conduct performance and clustering analyses with the help of Digital Government Reference Library (DGRL) v16.6 database examining the role of emerging…
Abstract
Purpose
This study aims to conduct performance and clustering analyses with the help of Digital Government Reference Library (DGRL) v16.6 database examining the role of emerging technologies (ETs) in public services delivery.
Design/methodology/approach
VOSviewer and SciMAT techniques were used for clustering and mapping the use of ETs in the public services delivery. Collecting documents from the DGRL v16.6 database, the paper uses text mining analysis for identifying key terms and trends in e-Government research regarding ETs and public services.
Findings
The analysis indicates that all ETs are strongly linked to each other, except for blockchain technologies (due to its disruptive nature), which indicate that ETs can be, therefore, seen as accumulative knowledge. In addition, on the whole, findings identify four stages in the evolution of ETs and their application to public services: the “electronic administration” stage, the “technological baseline” stage, the “managerial” stage and the “disruptive technological” stage.
Practical implications
The output of the present research will help to orient policymakers in the implementation and use of ETs, evaluating the influence of these technologies on public services.
Social implications
The research helps researchers to track research trends and uncover new paths on ETs and its implementation in public services.
Originality/value
Recent research has focused on the need of implementing ETs for improving public services, which could help cities to improve the citizens’ quality of life in urban areas. This paper contributes to expanding the knowledge about ETs and its implementation in public services, identifying trends and networks in the research about these issues.
Details
Keywords
Jonathan Passmore and David Tee
This study aimed to evaluate the potential of artificial intelligence (AI) as a tool for knowledge synthesis, the production of written content and the delivery of coaching…
Abstract
Purpose
This study aimed to evaluate the potential of artificial intelligence (AI) as a tool for knowledge synthesis, the production of written content and the delivery of coaching conversations.
Design/methodology/approach
The research employed the use of experts to evaluate the outputs from ChatGPT's AI tool in blind tests to review the accuracy and value of outcomes for written content and for coaching conversations.
Findings
The results from these tasks indicate that there is a significant gap between comparative search tools such as Google Scholar, specialist online discovery tools (EBSCO and PsycNet) and GPT-4's performance. GPT-4 lacks the accuracy and detail which can be found through other tools, although the material produced has strong face validity. It argues organisations, academic institutions and training providers should put in place policies regarding the use of such tools, and professional bodies should amend ethical codes of practice to reduce the risks of false claims being used in published work.
Originality/value
This is the first research paper to evaluate the current potential of generative AI tools for research, knowledge curation and coaching conversations.
Details
Keywords
Philip Hong Wei Jiang and William Yu Chung Wang
The purpose of this paper is to explain how enterprise resource planning (ERP) implementation evolves by cloud computing in different industries with different delivery models of…
Abstract
Purpose
The purpose of this paper is to explain how enterprise resource planning (ERP) implementation evolves by cloud computing in different industries with different delivery models of cloud ERP. This paper also investigates infrastructure as a service (IaaS) as a delivery approach for cloud ERP. Case research on IaaS is rarely found in the literature. In addition, this paper intends to reveal how this transformation from on-premises to the cloud would influence the ERP implementation process.
Design/methodology/approach
A multiple-case study is conducted to identify the different deployed models of cloud ERP systems in the implementation projects. The influences of emerging cloud computing technology on ERP implementation are investigated by interviewing consultants related to the projects.
Findings
The findings illustrate that not only software as a service (SaaS) but also IaaS and platform as a service cloud computing services are widely applied in cloud ERP implementation. This study also indicates that certain technical limitations of cloud ERP might have a positive effect on the outcome of ERP implementation.
Originality/value
This study investigates how cloud computing influences ERP implementation from different aspects. The result identifies both SaaS and IaaS as two different approaches widely adopted in cloud ERP implementation. Besides, this study has discussed in-depth and analyzed these two cloud ERP paradigms in five factors, including functionality, performance, portability, security, cost and customization. The classification and suggestions are original to the literature.
Details
Keywords
Miguel Calvo and Marta Beltrán
This paper aims to propose a new method to derive custom dynamic cyber risk metrics based on the well-known Goal, Question, Metric (GQM) approach. A framework that complements it…
Abstract
Purpose
This paper aims to propose a new method to derive custom dynamic cyber risk metrics based on the well-known Goal, Question, Metric (GQM) approach. A framework that complements it and makes it much easier to use has been proposed too. Both, the method and the framework, have been validated within two challenging application domains: continuous risk assessment within a smart farm and risk-based adaptive security to reconfigure a Web application firewall.
Design/methodology/approach
The authors have identified a problem and provided motivation. They have developed their theory and engineered a new method and a framework to complement it. They have demonstrated the proposed method and framework work, validating them in two real use cases.
Findings
The GQM method, often applied within the software quality field, is a good basis for proposing a method to define new tailored cyber risk metrics that meet the requirements of current application domains. A comprehensive framework that formalises possible goals and questions translated to potential measurements can greatly facilitate the use of this method.
Originality/value
The proposed method enables the application of the GQM approach to cyber risk measurement. The proposed framework allows new cyber risk metrics to be inferred by choosing between suggested goals and questions and measuring the relevant elements of probability and impact. The authors’ approach demonstrates to be generic and flexible enough to allow very different organisations with heterogeneous requirements to derive tailored metrics useful for their particular risk management processes.
Details
Keywords
Peyman Jafary, Davood Shojaei, Abbas Rajabifard and Tuan Ngo
Building information modeling (BIM) is a striking development in the architecture, engineering and construction (AEC) industry, which provides in-depth information on different…
Abstract
Purpose
Building information modeling (BIM) is a striking development in the architecture, engineering and construction (AEC) industry, which provides in-depth information on different stages of the building lifecycle. Real estate valuation, as a fully interconnected field with the AEC industry, can benefit from 3D technical achievements in BIM technologies. Some studies have attempted to use BIM for real estate valuation procedures. However, there is still a limited understanding of appropriate mechanisms to utilize BIM for valuation purposes and the consequent impact that BIM can have on decreasing the existing uncertainties in the valuation methods. Therefore, the paper aims to analyze the literature on BIM for real estate valuation practices.
Design/methodology/approach
This paper presents a systematic review to analyze existing utilizations of BIM for real estate valuation practices, discovers the challenges, limitations and gaps of the current applications and presents potential domains for future investigations. Research was conducted on the Web of Science, Scopus and Google Scholar databases to find relevant references that could contribute to the study. A total of 52 publications including journal papers, conference papers and proceedings, book chapters and PhD and master's theses were identified and thoroughly reviewed. There was no limitation on the starting date of research, but the end date was May 2022.
Findings
Four domains of application have been identified: (1) developing machine learning-based valuation models using the variables that could directly be captured through BIM and industry foundation classes (IFC) data instances of building objects and their attributes; (2) evaluating the capacity of 3D factors extractable from BIM and 3D GIS in increasing the accuracy of existing valuation models; (3) employing BIM for accurate estimation of components of cost approach-based valuation practices; and (4) extraction of useful visual features for real estate valuation from BIM representations instead of 2D images through deep learning and computer vision.
Originality/value
This paper contributes to research efforts on utilization of 3D modeling in real estate valuation practices. In this regard, this paper presents a broad overview of the current applications of BIM for valuation procedures and provides potential ways forward for future investigations.
Details
Keywords
Maciej Liguzinski and Nanna Kann-Rasmussen
The article investigates the institutional setup of e-lending in public libraries in Denmark, Norway and Sweden. Our point of departure is that e-lending has necessitated new…
Abstract
Purpose
The article investigates the institutional setup of e-lending in public libraries in Denmark, Norway and Sweden. Our point of departure is that e-lending has necessitated new library collaborations between local, regional and national levels, and therefore, institutional e-lending setups have emerged. The study seeks to provide better understanding of how the institutional setups are structured, how governance logics have shaped them and what tensions and dynamics become visible in the key actors’ problematisations of these setups.
Design/methodology/approach
The study is situated in the neo-institutional tradition and applies the institutional logics perspective. The research questions are answered by taking a qualitative approach, grounded in an extensive interview study with representatives of libraries, publishers and policy actors in three Scandinavian countries. To provide in-depth insight into e-lending setups, the scope of empirical material is then limited to accounts the central library and policy actors involved in establishing e-lending.
Findings
The analysis shows that the e-lending setups are both similar (especially when it comes to financing), and different across Scandinavia, especially when it comes to centralisation and involvement of librarians in this task. The differences are attributed to the influence of different governance logics (question of administrative autonomy, collaboration in the field and existing legal and political frames), and to what extent the digital and market logics are incorporated or rejected in the field.
Originality/value
The study provides new insights into the question of how Scandinavian public libraries face the consequences of the digitalisation of book distribution and consumption by investigating how they organise their e-lending services. This has not been explored before, notably in a comparative perspective.
Details
Keywords
Anshika Singh Tanwar, Harish Chaudhry and Manish Kumar Srivastava
This study aims to provide a holistic review of social media influencers (SMIs) research based on a unique approach of bibliometric analysis and content analysis between 2011 and…
Abstract
Purpose
This study aims to provide a holistic review of social media influencers (SMIs) research based on a unique approach of bibliometric analysis and content analysis between 2011 and 2020. The review examines the main influential aspects, themes and research streams to identify research directions for the future.
Design/methodology/approach
The sample selection and data collection were done from the Scopus database. The sample dataset was refined based on the inclusion and exclusion criteria to determine the final dataset of 183 articles. The dataset was exported in the BibTeX format and then imported into the BiblioShiny app for bibliometric analysis. The content analysis was done following the theory-context-methodology framework.
Findings
The several findings of this study include (1) Co-word analysis of most used keywords; (2) Longitudinal thematic evolution; (3) The focus of the research papers as per the theory-context-methodology review protocol are persuasion knowledge model, fashion and beauty industries, Instagram and content analysis, respectively; and (4) The network analysis of the research studies is known as the co-citation analysis and depicts the intellectual structure in the domain. This analysis resulted in four clusters of the research streams from the literature and two emergent themes (Chen et al., 2010)
Originality/value
In general, the previous reviews in the area are either domain, method or theory-based. Thus, this study aims to complement and extend the existing literature by presenting the overall picture of the SMI research with the help of a unique combined approach and further highlighting the trends and future research directions based on the findings of this study.
Details
Keywords
Armando Calabrese, Antonio D'Uffizi, Nathan Levialdi Ghiron, Luca Berloco, Elaheh Pourabbas and Nathan Proudlove
The primary objective of this paper is to show a systematic and methodological approach for the digitalization of critical clinical pathways (CPs) within the healthcare domain.
Abstract
Purpose
The primary objective of this paper is to show a systematic and methodological approach for the digitalization of critical clinical pathways (CPs) within the healthcare domain.
Design/methodology/approach
The methodology entails the integration of service design (SD) and action research (AR) methodologies, characterized by iterative phases that systematically alternate between action and reflective processes, fostering cycles of change and learning. Within this framework, stakeholders are engaged through semi-structured interviews, while the existing and envisioned processes are delineated and represented using BPMN 2.0. These methodological steps emphasize the development of an autonomous, patient-centric web application alongside the implementation of an adaptable and patient-oriented scheduling system. Also, business processes simulation is employed to measure key performance indicators of processes and test for potential improvements. This method is implemented in the context of the CP addressing transient loss of consciousness (TLOC), within a publicly funded hospital setting.
Findings
The methodology integrating SD and AR enables the detection of pivotal bottlenecks within diagnostic CPs and proposes optimal corrective measures to ensure uninterrupted patient care, all the while advancing the digitalization of diagnostic CP management. This study contributes to theoretical discussions by emphasizing the criticality of process optimization, the transformative potential of digitalization in healthcare and the paramount importance of user-centric design principles, and offers valuable insights into healthcare management implications.
Originality/value
The study’s relevance lies in its ability to enhance healthcare practices without necessitating disruptive and resource-intensive process overhauls. This pragmatic approach aligns with the imperative for healthcare organizations to improve their operations efficiently and cost-effectively, making the study’s findings relevant.
Details
Keywords
The rapid expansion of internet usage and device connectivity has underscored the importance of understanding the public’s cyber behavior and knowledge. Despite this, there is…
Abstract
Purpose
The rapid expansion of internet usage and device connectivity has underscored the importance of understanding the public’s cyber behavior and knowledge. Despite this, there is little research that examines the public’s objective knowledge of secure information security practices. The purpose of this study is to examine how objective cyber awareness is distributed throughout society.
Design/methodology/approach
This study draws on a large national survey of adults to examine the relationship between individual factors – such as demographic attributes and socioeconomic resources – and information security awareness. The study estimates several statistical models using weighted logistic regression to model objective information security awareness.
Findings
The results indicate that socioeconomic resources such as income and education have a significant effect on individuals’ information security awareness with richer and more highly educated individuals exhibiting greater awareness of important security practices and tools. Additionally, age and gender represent consistent and clear informational gaps in society as older individuals and females are significantly less knowledgeable about an array of information security practices than younger individuals and males, respectively.
Social implications
The findings have important implications for our understanding of information security behavior and user vulnerability in an increasingly digital and connected society. Despite the growing importance of cybersecurity for all individuals in nearly all domains of daily life, there is substantial inequality in awareness about secure cyber practices and the tools and techniques used to protect one’s self from attacks. While digital technology will continue to permeate many aspects of daily life – from financial transactions to health services to social interactions – the findings here indicate that some users may be far more exposed and vulnerable to attack than others.
Originality/value
This study contributes to our understanding of general user information security awareness using a large survey and statistical models to generalize about the public’s information security awareness across multiple domains and stimulates future research on public knowledge of information security. The findings indicate that some users may be far more exposed and vulnerable to attack than others. Despite the growing importance of cybersecurity for all individuals in nearly all domains of daily life, there is substantial inequality in awareness about secure cyber practices and the tools and techniques used to protect one’s self from attacks.
Details
Keywords
Javaid Ahmad Wani, Taseef Ayub Sofi, Ishrat Ayub Sofi and Shabir Ahmad Ganaie
Open-access repositories (OARs) are essential for openly disseminating intellectual knowledge on the internet and providing free access to it. The current study aims to evaluate…
Abstract
Purpose
Open-access repositories (OARs) are essential for openly disseminating intellectual knowledge on the internet and providing free access to it. The current study aims to evaluate the growth and development of OARs in the field of technology by investigating several characteristics such as coverage, OA policies, software type, content type, yearly growth, repository type and geographic contribution.
Design/methodology/approach
The directory of OARs acts as the source for data harvesting, which provides a quality-assured list of OARs across the globe.
Findings
The study found that 125 nations contributed a total of 4,045 repositories in the field of research, with the USA leading the list with the most repositories. Maximum repositories were operated by institutions having multidisciplinary approaches. The DSpace and Eprints were the preferred software types for repositories. The preferred upload content by contributors was “research articles” and “electronic thesis and dissertations”.
Research limitations/implications
The study is limited to the subject area technology as listed in OpenDOAR; therefore, the results may differ in other subject areas.
Practical implications
The work can benefit researchers across disciplines and, interested researchers can take this study as a base for evaluating online repositories. Moreover, policymakers and repository managers could also get benefitted from this study.
Originality/value
The study is the first of its kind, to the best of the authors’ knowledge, to investigate the repositories of subject technology in the open-access platform.
Details