Search results

1 – 6 of 6
Article
Publication date: 14 April 2023

Zihao Ye, Georgios Kapogiannis, Shu Tang, Zhiang Zhang, Carlos Jimenez-Bescos and Tianlun Yang

Built asset management processes require a long transition period to collect, edit and update asset conditions information from existing data sets. This paper aims to explore and…

Abstract

Purpose

Built asset management processes require a long transition period to collect, edit and update asset conditions information from existing data sets. This paper aims to explore and explain whether and how digital technologies, including asset information model (AIM), Internet of Things (IoT) and blockchain, can enhance asset conditions assessment and lead to better asset management.

Design/methodology/approach

Mixed methods are applied to achieve the research objective with a focus in universities. The questionnaire aims to test whether the integration of AIM, IoT and blockchain can enhance asset condition assessment (ACA). Descriptive statistical analysis was applied to the quantitative data. The mean, median, mode, standard deviation, variance, skewness and range of the data group were calculated. Semi-structured interviews were designed to answer how the integration of AIM, IoT and blockchain can enhance the ACA. Quantitative data was analysed to define and explain the essential factors for each sub-hypothesis. Meanwhile, to strengthen the evaluation of the research hypothesis, the researcher also obtained secondary data from the literature review.

Findings

The research shows that the integration of AIM, IoT and blockchain strongly influences asset conditions assessment. The integration of AIM, IoT and blockchain can improve the asset monitoring and diagnostics through its life cycle and in different aspects, including financial, physical, functional and sustainability. Moreover, the integration of AIM, IoT and blockchain can enhance cross-functional collaboration to avoid misunderstandings, various barriers and enhance trust, communication and collaboration between the team members. Finally, costs and risk could be reduced, and performance could be increased during the ACA.

Practical implications

The contribution of this study indicated that the integration of AIM, IoT and blockchain application in asset assessment could increase the efficiency, accuracy, stability and flexibility of asset assessment to ensure the reliability of assets and lead to a high-efficiency working environment. More importantly, a key performance indicator for ACA based on the asset information, technology and people experience could be developed gradually.

Originality/value

This study can break the gap between transdisciplinary knowledge to improve the integration of people, technology (AIM, IoT and blockchain) and process value-based ACA in built asset management within universities.

Details

Construction Innovation , vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1471-4175

Keywords

Article
Publication date: 30 June 2023

Ebru Altan and Zeynep Işık

Increasing complexity in construction projects evokes interest in application of innovative digital technologies in construction. Digital twins (DT), which bring these innovative…

Abstract

Purpose

Increasing complexity in construction projects evokes interest in application of innovative digital technologies in construction. Digital twins (DT), which bring these innovative technologies together, have strong interactions with lean construction (LC). To highlight the collaborative nature of DT and LC, the paper explores the interactions between LC and DT and assesses benefits, costs, opportunities and risks (BOCR) of DT in LC to analyze significant obstacles and enablers in DT adoption in LC.

Design/methodology/approach

BOCR approach comprehensively considers both the positive and the negative attributes of a problem. At the first step, BOCR criteria for DT are identified through literature review and expert opinions, at the second step dependencies among BOCR criteria for DT in LC are determined by neutrosophic analytic hierarchy process (AHP), through a questionnaire survey. Integrating BOCR into neutrosophic AHP enables achieving more meaningful preference scores.

Findings

Cost of skilled workforce is the most important factor and opportunity to reduce waste is the second most important factor in adoption of DT in LC. The results were analyzed to rank the BOCR of adoption of DT in LC.

Originality/value

This study, in a novel way, performs BOCR analysis through neutrosophic AHP to reflect experts' judgments more effectively by neutrosophic AHP's better handling of vagueness and uncertainty. The paper provides a model to better understand the significant factors that influence adoption of DT in LC.

Details

Engineering, Construction and Architectural Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0969-9988

Keywords

Article
Publication date: 1 March 2024

Mohan Thite and Ramanathan Iyer

Despite ongoing reports of insider-driven leakage of confidential data, both academic scholars and practitioners tend to focus on external threats and favour information…

Abstract

Purpose

Despite ongoing reports of insider-driven leakage of confidential data, both academic scholars and practitioners tend to focus on external threats and favour information technology (IT)-centric solutions to secure and strengthen their information security ecosystem. Unfortunately, they pay little attention to human resource management (HRM) solutions. This paper aims to address this gap and proposes an actionable human resource (HR)-centric and artificial intelligence (AI)-driven framework.

Design/methodology/approach

The paper highlights the dangers posed by insider threats and presents key findings from a Leximancer-based analysis of a rapid literature review on the role, nature and contribution of HRM for information security, especially in addressing insider threats. The study also discusses the limitations of these solutions and proposes an HR-in-the-loop model, driven by AI and machine learning to mitigate these limitations.

Findings

The paper argues that AI promises to offer many HRM-centric opportunities to fortify the information security architecture if used strategically and intelligently. The HR-in-the-loop model can ensure that the human factors are considered when designing information security solutions. By combining AI and machine learning with human expertise, this model can provide an effective and comprehensive approach to addressing insider threats.

Originality/value

The paper fills the research gap on the critical role of HR in securing and strengthening information security. It makes further contribution in identifying the limitations of HRM solutions in info security and how AI and machine learning can be leveraged to address these limitations to some extent.

Details

Personnel Review, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0048-3486

Keywords

Article
Publication date: 7 November 2023

Marko Niemimaa

The purpose of this research is to study how compliance evaluation becomes performed in practice. Compliance evaluation is a common practice among organizations that need to…

Abstract

Purpose

The purpose of this research is to study how compliance evaluation becomes performed in practice. Compliance evaluation is a common practice among organizations that need to evaluate their posture against a set of criteria (e.g. a standard, legislative framework and “best practices”). The results of these evaluations have significant importance for organizations, especially in the context of information security and continuity. The author argues that how these evaluations become performed is not merely a “social” activity but shaped by the materiality of the evaluation criteria

Design/methodology/approach

The authors adopt a sociomaterial practice-based view to study the compliance evaluation through in situ participant observations from compliance evaluation workshops to evaluate organizational compliance against a information security and business continuity criteria. The empirical material was analyzed to construct vignettes that serve to illustrate the practice of compliance evaluation.

Findings

The research analysis shows how the information security and business continuity criteria themselves partake in the compliance evaluations by operating through (ventriloqually) the evaluators on three strata: the material, the textual and the structural. The author also provides a conceptualization of a hybrid agency.

Originality/value

This research contributes to lack of studies on the organizational-level compliance. Further, the research is an original contribution to information security and business continuity management by focusing on the practices of compliance evaluation. Further, the research has theoretical novelty by adopting the ventriloqual agency as a hybrid agency to study the sociomateriality of a phenomenon.

Details

Information Technology & People, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 21 September 2023

Faisal Mahmood, Abdul Zahid Khan, Sajid Amir Shah and Muhammad Adil

The purpose of this study is to investigate the post–enterprise resource planning (ERP) issues and challenges in the context of Saudi Arabia. There is a lack of research in the…

Abstract

Purpose

The purpose of this study is to investigate the post–enterprise resource planning (ERP) issues and challenges in the context of Saudi Arabia. There is a lack of research in the context of developing countries regarding post-ERP implementation issues and challenges. The high failure rate of the ERP system is a reflection of many management issues that occurred at different phases of ERP implementation. Previous research indicated that even after a successful implementation, the ERP system was unable to sustain itself in the organizations.

Design/methodology/approach

An exploratory case study design was adopted to proceed with this research process at two organizations in Saudi Arabia. The interviews of the top and middle management are conducted and transcribed. These case studies were further analyzed using the Creswell approach to generate several themes, and descriptions provided a deeper understanding of the post ERP implementation issues and challenges.

Findings

Research findings show that for successful ERP implementation, identified factors are top management support, integration, strategy, employee resistance, BPR, change management, vendor selection, team formation and culture. Moreover, factors for the post-ERP implementation that led to sustainability are top management support, training, system adoption, system testing, data migration, cost overrun, employee retention and post-implementation support.

Originality/value

This study is unique in its type to examine the issues and challenges organizations face after deploying ERP initiatives. This research's findings were useful and supportive for the senior management interested in successfully sustaining such an initiative in the organization.

Details

Kybernetes, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0368-492X

Keywords

Open Access
Article
Publication date: 9 January 2024

Kazuyuki Motohashi and Chen Zhu

This study aims to assess the technological capability of Chinese internet platforms (BAT: Baidu, Alibaba, Tencent) compared to US ones (GAFA: Google, Amazon, Facebook, Apple)…

Abstract

Purpose

This study aims to assess the technological capability of Chinese internet platforms (BAT: Baidu, Alibaba, Tencent) compared to US ones (GAFA: Google, Amazon, Facebook, Apple). More specifically, this study explores Baidu’s technological catching-up process with Google by analyzing their patent textual information.

Design/methodology/approach

The authors retrieved 26,383 Google patents and 6,695 Baidu patents from PATSTAT 2019 Spring version. The collected patent documents were vectorized using the Word2Vec model first, and then K-means clustering was applied to visualize the technological space of two firms. Finally, novel indicators were proposed to capture the technological catching-up process between Baidu and Google.

Findings

The results show that Baidu follows a trend of US rather than Chinese technology which suggests Baidu is aggressively seeking to catch up with US players in the process of its technological development. At the same time, the impact index of Baidu patents increases over time, reflecting its upgrading of technological competitiveness.

Originality/value

This study proposed a new method to analyze technology mapping and evolution based on patent text information. As both US and China are crucial players in the internet industry, it is vital for policymakers in third countries to understand the technological capacity and competitiveness of both countries to develop strategic partnerships effectively.

Details

Asia Pacific Journal of Innovation and Entrepreneurship, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2071-1395

Keywords

1 – 6 of 6