Search results

1 – 10 of 552
Article
Publication date: 29 August 2022

Amanpreet Kaur, Vikas Kumar, Rahul Sindhwani, Punj Lata Singh and Abhishek Behl

Due to the financial disturbances created by the COVID-19 pandemic and the burden on the government exchequer, it is expected to see a rise in the knowledge base of the research…

482

Abstract

Purpose

Due to the financial disturbances created by the COVID-19 pandemic and the burden on the government exchequer, it is expected to see a rise in the knowledge base of the research corpus so far as the government's fiscal sustainability is concerned. Therefore, the present research examines a systematic quantitative analysis of public debt sustainability research by applying a bibliometric approach. Research also analyzes journals, institutions, countries and authors contributing to public debt sustainability.

Design/methodology/approach

This paper scrutinizes the published scientific research on public debt sustainability based on the dataset of 535 articles from 1991 to 2021 obtained from the Scopus database. Biblioshiny (R-based application) and VoSviewer software were used to perform bibliometric analysis through Performance analysis and science mapping techniques. The authors combined co-citation analysis (CCA), bibliometric analysis, keyword co-occurrence analysis (KCA) and a conceptual thematic map of the most cited articles to find the intellectual structure.

Findings

The research identified three dominating clusters, e.g. fiscal sustainability and policy rules, empirical sustainability testing and debt and growth dynamics. Another finding was that most articles were analytical and empirical and few descriptive articles were found. Owing to the empirical nature of the domain, the issues concerning public debt sustainability have continued to change over the past decades for different economies, reflecting the complexity and diversity of economic structures of different economies at different times.

Originality/value

The insight of this article provides academicians and researchers with a more refined comprehension of the conceptual and intellectual structure of the research corpus. The present research complements the existing literature review studies by pushing the research towards emerging or less developed issues such as financial and debt crises.

Details

International Journal of Emerging Markets, vol. 19 no. 4
Type: Research Article
ISSN: 1746-8809

Keywords

Article
Publication date: 10 April 2024

Anna Visvizi, Radosław Malik, Gianluca Maria Guazzo and Vilma Çekani

Against the background of the I50 paradigm, this paper queries in what ways blockchain and blockchain-based applications deployed in the smart city context facilitate the…

15

Abstract

Purpose

Against the background of the I50 paradigm, this paper queries in what ways blockchain and blockchain-based applications deployed in the smart city context facilitate the integration of the I50 paradigm in smart urban contexts.

Design/methodology/approach

A mixed methods approach is applied. First, by means of desk research and thematic literature review, a conceptual model integrating the I50 paradigm, smart city and blockchain-based solutions is built. Second, science mapping bibliometric analysis (SciMat) based on keywords’ co-occurrence is applied to a sample of 491 research articles to identify key domains of blockchain-based applications’ use in smart city. Third, a semi-systematic literature review complements insights gained through SciMat. Fourth, the findings are interpreted through the precepts of the conceptual model devised earlier.

Findings

The key blockchain-based applications in smart cities pertain to two domains, i.e. the foundational, service facilitation-oriented domain, including security (and safety), networks, computing, resource management and the service delivery-oriented domain, including mobility, energy and healthcare. Blockchain serves as the key building block for applications developed to deliver functions specific to each of the thus identified domains. A substantial layering of blockchain-based tools and applications is necessary to advance from the less to the more complex functional domains of the smart city.

Originality/value

At the conceptual level, the intricacies of the (making of the) I50 paradigm are discussed and a case for I50 – smart city – blockchain nexus is made. Easton’s input–output model as well as constructivism is referenced. At the empirical level, the key major domains of blockchain-based applications are discussed; those that bear the prospect of integrating the I50 paradigm in the smart city are highlighted. At the methodological level, a strategic move is made aimed at restoring the literature review’s role as subservient to the key line of exploration, to justify and ultimately support it, rather than to showcase the literature review as the ultimate purpose for itself.

Details

European Journal of Innovation Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1460-1060

Keywords

Open Access
Article
Publication date: 28 April 2022

Manuel Pedro Rodríguez Bolívar and Laura Alcaide Muñoz

This study aims to conduct performance and clustering analyses with the help of Digital Government Reference Library (DGRL) v16.6 database examining the role of emerging…

2127

Abstract

Purpose

This study aims to conduct performance and clustering analyses with the help of Digital Government Reference Library (DGRL) v16.6 database examining the role of emerging technologies (ETs) in public services delivery.

Design/methodology/approach

VOSviewer and SciMAT techniques were used for clustering and mapping the use of ETs in the public services delivery. Collecting documents from the DGRL v16.6 database, the paper uses text mining analysis for identifying key terms and trends in e-Government research regarding ETs and public services.

Findings

The analysis indicates that all ETs are strongly linked to each other, except for blockchain technologies (due to its disruptive nature), which indicate that ETs can be, therefore, seen as accumulative knowledge. In addition, on the whole, findings identify four stages in the evolution of ETs and their application to public services: the “electronic administration” stage, the “technological baseline” stage, the “managerial” stage and the “disruptive technological” stage.

Practical implications

The output of the present research will help to orient policymakers in the implementation and use of ETs, evaluating the influence of these technologies on public services.

Social implications

The research helps researchers to track research trends and uncover new paths on ETs and its implementation in public services.

Originality/value

Recent research has focused on the need of implementing ETs for improving public services, which could help cities to improve the citizens’ quality of life in urban areas. This paper contributes to expanding the knowledge about ETs and its implementation in public services, identifying trends and networks in the research about these issues.

Details

Information Technology & People, vol. 37 no. 8
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 17 June 2021

Ambica Ghai, Pradeep Kumar and Samrat Gupta

Web users rely heavily on online content make decisions without assessing the veracity of the content. The online content comprising text, image, video or audio may be tampered…

1153

Abstract

Purpose

Web users rely heavily on online content make decisions without assessing the veracity of the content. The online content comprising text, image, video or audio may be tampered with to influence public opinion. Since the consumers of online information (misinformation) tend to trust the content when the image(s) supplement the text, image manipulation software is increasingly being used to forge the images. To address the crucial problem of image manipulation, this study focusses on developing a deep-learning-based image forgery detection framework.

Design/methodology/approach

The proposed deep-learning-based framework aims to detect images forged using copy-move and splicing techniques. The image transformation technique aids the identification of relevant features for the network to train effectively. After that, the pre-trained customized convolutional neural network is used to train on the public benchmark datasets, and the performance is evaluated on the test dataset using various parameters.

Findings

The comparative analysis of image transformation techniques and experiments conducted on benchmark datasets from a variety of socio-cultural domains establishes the effectiveness and viability of the proposed framework. These findings affirm the potential applicability of proposed framework in real-time image forgery detection.

Research limitations/implications

This study bears implications for several important aspects of research on image forgery detection. First this research adds to recent discussion on feature extraction and learning for image forgery detection. While prior research on image forgery detection, hand-crafted the features, the proposed solution contributes to stream of literature that automatically learns the features and classify the images. Second, this research contributes to ongoing effort in curtailing the spread of misinformation using images. The extant literature on spread of misinformation has prominently focussed on textual data shared over social media platforms. The study addresses the call for greater emphasis on the development of robust image transformation techniques.

Practical implications

This study carries important practical implications for various domains such as forensic sciences, media and journalism where image data is increasingly being used to make inferences. The integration of image forgery detection tools can be helpful in determining the credibility of the article or post before it is shared over the Internet. The content shared over the Internet by the users has become an important component of news reporting. The framework proposed in this paper can be further extended and trained on more annotated real-world data so as to function as a tool for fact-checkers.

Social implications

In the current scenario wherein most of the image forgery detection studies attempt to assess whether the image is real or forged in an offline mode, it is crucial to identify any trending or potential forged image as early as possible. By learning from historical data, the proposed framework can aid in early prediction of forged images to detect the newly emerging forged images even before they occur. In summary, the proposed framework has a potential to mitigate physical spreading and psychological impact of forged images on social media.

Originality/value

This study focusses on copy-move and splicing techniques while integrating transfer learning concepts to classify forged images with high accuracy. The synergistic use of hitherto little explored image transformation techniques and customized convolutional neural network helps design a robust image forgery detection framework. Experiments and findings establish that the proposed framework accurately classifies forged images, thus mitigating the negative socio-cultural spread of misinformation.

Details

Information Technology & People, vol. 37 no. 2
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 10 May 2023

Pietro Pavone, Paolo Ricci and Massimiliano Calogero

This paper aims to investigate the literacy corpus regarding the potential of big data to improve public decision-making processes and direct these processes toward the creation…

Abstract

Purpose

This paper aims to investigate the literacy corpus regarding the potential of big data to improve public decision-making processes and direct these processes toward the creation of public value. This paper presents a map of current knowledge in a sample of selected articles and explores the intersecting points between data from the private sector and the public dimension in relation to benefits for society.

Design/methodology/approach

A bibliometric analysis was performed to provide a retrospective review of published content in the past decade in the field of big data for the public interest. This paper describes citation patterns, key topics and publication trends.

Findings

The findings indicate a propensity in the current literature to deal with the issue of data value creation in the private dimension (data as input to improve business performance or customer relations). Research on data for the public good has so far been underestimated. Evidence shows that big data value creation is closely associated with a collective process in which multiple levels of interaction and data sharing develop between both private and public actors in data ecosystems that pose new challenges for accountability and legitimation processes.

Research limitations/implications

The bibliometric method focuses on academic papers. This paper does not include conference proceedings, books or book chapters. Consequently, a part of the existing literature was excluded from the investigation and further empirical research is required to validate some of the proposed theoretical assumptions.

Originality/value

Although this paper presents the main contents of previous studies, it highlights the need to systematize data-driven private practices for public purposes. This paper offers insights to better understand these processes from a public management perspective.

Details

Meditari Accountancy Research, vol. 32 no. 2
Type: Research Article
ISSN: 2049-372X

Keywords

Article
Publication date: 2 April 2024

Andrew Swan, Anne Schiffer, Peter Skipworth and James Huntingdon

This paper aims to present a literature review of remote monitoring systems for water infrastructure in the Global South.

Abstract

Purpose

This paper aims to present a literature review of remote monitoring systems for water infrastructure in the Global South.

Design/methodology/approach

Following initial scoping searches, further examination was made of key remote monitoring technologies for water infrastructure in the Global South. A standard literature search methodology was adopted to examine these monitoring technologies and their respective deployments. This hierarchical approach prioritised “peer-reviewed” articles, followed by “scholarly” publications, then “credible” information sources and, finally, “other” relevant materials. The first two search phases were conducted using academic search services (e.g. Scopus and Google Scholar). In the third and fourth phases, Web searches were carried out on various stakeholders, including manufacturers, governmental agencies and non-governmental organisations/charities associated with Water, Sanitation and Hygiene (WASH) in the Global South.

Findings

This exercise expands the number of monitoring technologies considered in comparison to earlier review publications. Similarly, preceding reviews have largely focused upon monitoring applications in sub-Saharan Africa (SSA). This paper explores opportunities in other geographical regions and highlights India as a significant potential market for these tools.

Research limitations/implications

This review predominantly focuses upon information/data currently available in the public domain.

Practical implications

Remote monitoring technologies enable the rapid detection of broken water pumps. Broken water infrastructure significantly impacts many vulnerable communities, often leading to the use of less protected water sources and increased exposure to water-related diseases. Further to these public health impacts, there are additional economic disadvantages for these user communities.

Originality/value

This literature review has sought to address some key technological omissions and to widen the geographical scope associated with previous investigations.

Details

Journal of Engineering, Design and Technology , vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1726-0531

Keywords

Open Access
Article
Publication date: 28 August 2023

Jonathan Passmore and David Tee

This study aimed to evaluate the potential of artificial intelligence (AI) as a tool for knowledge synthesis, the production of written content and the delivery of coaching…

1816

Abstract

Purpose

This study aimed to evaluate the potential of artificial intelligence (AI) as a tool for knowledge synthesis, the production of written content and the delivery of coaching conversations.

Design/methodology/approach

The research employed the use of experts to evaluate the outputs from ChatGPT's AI tool in blind tests to review the accuracy and value of outcomes for written content and for coaching conversations.

Findings

The results from these tasks indicate that there is a significant gap between comparative search tools such as Google Scholar, specialist online discovery tools (EBSCO and PsycNet) and GPT-4's performance. GPT-4 lacks the accuracy and detail which can be found through other tools, although the material produced has strong face validity. It argues organisations, academic institutions and training providers should put in place policies regarding the use of such tools, and professional bodies should amend ethical codes of practice to reduce the risks of false claims being used in published work.

Originality/value

This is the first research paper to evaluate the current potential of generative AI tools for research, knowledge curation and coaching conversations.

Details

Journal of Work-Applied Management, vol. 16 no. 1
Type: Research Article
ISSN: 2205-2062

Keywords

Open Access
Article
Publication date: 28 March 2024

Elgazzar Iman Mahmoud Khalil

At the beginning of the 21st century, a new class of information workers, the “information have-less” has risen. This class of workers alleviates the influence of information and…

Abstract

Purpose

At the beginning of the 21st century, a new class of information workers, the “information have-less” has risen. This class of workers alleviates the influence of information and communication technologies (ICTs) revolution on poverty and unemployment. The purpose of this study is to investigate the presence of this class of workers in Egypt and assess the size and potential growth of this category of workers.

Design/methodology/approach

The study clarifies the conceptual framework of the new division of labor, in the information age. The Central Agency for Public Mobilization and Statistics, American Chamber of Commerce in Egypt, Ministry of Communications and Information Technology and Information and Decision Support Center websites provided secondary data for this study. These data are used to assess the size of “the information have less” in Egypt.

Findings

The division of work and class, in the 21st century, depends on the level of skills possessed to work with ICTs. So, class and labor nowadays could be divided into self-programmable labor (Innovators). Information have-less labor class, adding value to the economy by learning skills and presenting repetitive work. Generic labor class, who cannot work with ICTs, and work in jobs, that do not need computers or other ICTs. The study has shown that the “information have-less” labor class is present in Egypt since the beginning of the 21st century, in all its categories; entrepreneurism, the service sector and the manufacturing sector. There are approximately 50% of this labor class in the service sector and only 13% of the information have-less works in manufacturing sector despite the great opportunities that Egypt has to expand manufacturing to absorb more employment. The inclusion of information technology (IT), in all domains, has not decreased employment in Western countries but has reallocated information have-less employment toward the service sector, and there would probably be the same effect in Egypt.

Practical implications

The study highlights the need for Egyptian policymakers to encourage the manufacturing and service sectors to provide huge working opportunities. The Egyptian government has to change the educational policies, at all stages, to include digital learning skills so IT can be incorporated in a wide range of economic activities. Further research includes: conducting a survey to measure the contribution of the entrepreneurial part of the information have-less employment in Egypt. In addition, a model may be developed, by the researcher to examine the reallocation of employees in Egypt.

Originality/value

Studying employment, in Egypt, using the conceptual framework of the information age is rarely being done.

Details

Review of Economics and Political Science, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2356-9980

Keywords

Article
Publication date: 28 March 2022

Philip Hong Wei Jiang and William Yu Chung Wang

The purpose of this paper is to explain how enterprise resource planning (ERP) implementation evolves by cloud computing in different industries with different delivery models of…

Abstract

Purpose

The purpose of this paper is to explain how enterprise resource planning (ERP) implementation evolves by cloud computing in different industries with different delivery models of cloud ERP. This paper also investigates infrastructure as a service (IaaS) as a delivery approach for cloud ERP. Case research on IaaS is rarely found in the literature. In addition, this paper intends to reveal how this transformation from on-premises to the cloud would influence the ERP implementation process.

Design/methodology/approach

A multiple-case study is conducted to identify the different deployed models of cloud ERP systems in the implementation projects. The influences of emerging cloud computing technology on ERP implementation are investigated by interviewing consultants related to the projects.

Findings

The findings illustrate that not only software as a service (SaaS) but also IaaS and platform as a service cloud computing services are widely applied in cloud ERP implementation. This study also indicates that certain technical limitations of cloud ERP might have a positive effect on the outcome of ERP implementation.

Originality/value

This study investigates how cloud computing influences ERP implementation from different aspects. The result identifies both SaaS and IaaS as two different approaches widely adopted in cloud ERP implementation. Besides, this study has discussed in-depth and analyzed these two cloud ERP paradigms in five factors, including functionality, performance, portability, security, cost and customization. The classification and suggestions are original to the literature.

Details

VINE Journal of Information and Knowledge Management Systems, vol. 54 no. 3
Type: Research Article
ISSN: 2059-5891

Keywords

Article
Publication date: 16 October 2023

Miguel Calvo and Marta Beltrán

This paper aims to propose a new method to derive custom dynamic cyber risk metrics based on the well-known Goal, Question, Metric (GQM) approach. A framework that complements it…

Abstract

Purpose

This paper aims to propose a new method to derive custom dynamic cyber risk metrics based on the well-known Goal, Question, Metric (GQM) approach. A framework that complements it and makes it much easier to use has been proposed too. Both, the method and the framework, have been validated within two challenging application domains: continuous risk assessment within a smart farm and risk-based adaptive security to reconfigure a Web application firewall.

Design/methodology/approach

The authors have identified a problem and provided motivation. They have developed their theory and engineered a new method and a framework to complement it. They have demonstrated the proposed method and framework work, validating them in two real use cases.

Findings

The GQM method, often applied within the software quality field, is a good basis for proposing a method to define new tailored cyber risk metrics that meet the requirements of current application domains. A comprehensive framework that formalises possible goals and questions translated to potential measurements can greatly facilitate the use of this method.

Originality/value

The proposed method enables the application of the GQM approach to cyber risk measurement. The proposed framework allows new cyber risk metrics to be inferred by choosing between suggested goals and questions and measuring the relevant elements of probability and impact. The authors’ approach demonstrates to be generic and flexible enough to allow very different organisations with heterogeneous requirements to derive tailored metrics useful for their particular risk management processes.

Details

Information & Computer Security, vol. 32 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

1 – 10 of 552