Search results

1 – 10 of 193
Open Access
Article
Publication date: 23 March 2020

Hedaia-t-Allah Nabil Abd Al Ghaffar

The purpose of this paper is to try to reach the main factors that could put national security at risk as a result of government cloud computing programs.

7324

Abstract

Purpose

The purpose of this paper is to try to reach the main factors that could put national security at risk as a result of government cloud computing programs.

Design/methodology/approach

The paper adopts the analytical approach to first lay foundations of the relation between national security, cybersecurity and cloud computing, then it moves to analyze the main vulnerabilities that could affect national security in cases of government cloud computing usage.

Findings

The paper reached several findings such as the relation between cybersecurity and national security as well as a group of factors that may affect national security when governments shift to cloud computing mainly pertaining to storing data over the internet, the involvement of a third party, the lack of clear regulatory frameworks inside and between countries.

Practical implications

Governments are continuously working on developing their digital capacities to meet citizens’ demands. One of the most trending technologies adopted by governments is “cloud computing”, because of the tremendous advantages that the technology provides; such as huge cost-cutting, huge storage and computing capabilities. However, shifting to cloud computing raises a lot of security concerns.

Originality/value

The value of the paper resides in the novelty of the topic, which is a new contribution to the theoretical literature on relations between new technologies and national security. It is empirically important as well to help governments stay safe while enjoying the advantages of cloud computing.

Details

Review of Economics and Political Science, vol. 9 no. 2
Type: Research Article
ISSN: 2356-9980

Keywords

Open Access
Article
Publication date: 23 January 2024

Wang Zengqing, Zheng Yu Xie and Jiang Yiling

With the rapid development of railway-intelligent video technology, scene understanding is becoming more and more important. Semantic segmentation is a major part of scene…

Abstract

Purpose

With the rapid development of railway-intelligent video technology, scene understanding is becoming more and more important. Semantic segmentation is a major part of scene understanding. There is an urgent need for an algorithm with high accuracy and real-time to meet the current railway requirements for railway identification. In response to this demand, this paper aims to explore a variety of models, accurately locate and segment important railway signs based on the improved SegNeXt algorithm, supplement the railway safety protection system and improve the intelligent level of railway safety protection.

Design/methodology/approach

This paper studies the performance of existing models on RailSem19 and explores the defects of each model through performance so as to further explore an algorithm model dedicated to railway semantic segmentation. In this paper, the authors explore the optimal solution of SegNeXt model for railway scenes and achieve the purpose of this paper by improving the encoder and decoder structure.

Findings

This paper proposes an improved SegNeXt algorithm: first, it explores the performance of various models on railways, studies the problems of semantic segmentation on railways and then analyzes the specific problems. On the basis of retaining the original excellent MSCAN encoder of SegNeXt, multiscale information fusion is used to further extract detailed features such as multihead attention and mask, solving the problem of inaccurate segmentation of current objects by the original SegNeXt algorithm. The improved algorithm is of great significance for the segmentation and recognition of railway signs.

Research limitations/implications

The model constructed in this paper has advantages in the feature segmentation of distant small objects, but it still has the problem of segmentation fracture for the railway, which is not completely segmented. In addition, in the throat area, due to the complexity of the railway, the segmentation results are not accurate.

Social implications

The identification and segmentation of railway signs based on the improved SegNeXt algorithm in this paper is of great significance for the understanding of existing railway scenes, which can greatly improve the classification and recognition ability of railway small object features and can greatly improve the degree of railway security.

Originality/value

This article introduces an enhanced version of the SegNeXt algorithm, which aims to improve the accuracy of semantic segmentation on railways. The study begins by investigating the performance of different models in railway scenarios and identifying the challenges associated with semantic segmentation on this particular domain. To address these challenges, the proposed approach builds upon the strong foundation of the original SegNeXt algorithm, leveraging techniques such as multi-scale information fusion, multi-head attention, and masking to extract finer details and enhance feature representation. By doing so, the improved algorithm effectively resolves the issue of inaccurate object segmentation encountered in the original SegNeXt algorithm. This advancement holds significant importance for the accurate recognition and segmentation of railway signage.

Details

Smart and Resilient Transportation, vol. 6 no. 1
Type: Research Article
ISSN: 2632-0487

Keywords

Open Access
Article
Publication date: 16 October 2023

Emmanuel Dele Omopariola, Abimbola Olukemi Windapo, David John Edwards, Clinton Ohis Aigbavboa, Sunday Ukwe-Nya Yakubu and Onimisi Obari

Previous studies have postulated that an advance payment system (APS) positively impacts the contractor's working capital and is paramount to ensuring an efficient and effective…

Abstract

Purpose

Previous studies have postulated that an advance payment system (APS) positively impacts the contractor's working capital and is paramount to ensuring an efficient and effective project cash flow process. However, scant research has been undertaken to empirically establish the cash flow performance and domino effect of APS on project and organisational performance.

Design/methodology/approach

The epistemological design adopted a positivist philosophical stance augmented by deductive reasoning to explore the phenomena under investigation. Primary quantitative data were collected from 504 Construction Industry Development Board (CIDB) registered contractors (within the grade bandings 1–9) in South Africa. A five-point Likert scale was utilised, and subsequent data accrued were analysed using structural equation modelling (SEM).

Findings

Emergent findings reveal that the mandatory use of an APS does not guarantee a positive project cash flow, an improvement in organisational performance or an improvement in project performance.

Practical implications

The ensuing discussion reveals the contributory influence of APS on positive cash flow and organisational performance, although APS implementation alone will not achieve these objectives. Practically, the research accentuates the need for various measures to be concurrently adopted (including APS) towards ensuring a positive project cash flow and improved organisational and project performance.

Originality/value

There is limited empirical research on cash flow performance and the domino effect of APS on project and organisational performance in South Africa, nor indeed, the wider geographical location of Africa as a continent. This study addresses this gap in the prevailing body of knowledge.

Details

Engineering, Construction and Architectural Management, vol. 31 no. 13
Type: Research Article
ISSN: 0969-9988

Keywords

Open Access
Article
Publication date: 25 April 2024

Da Huo, Rihui Ouyang, Aidi Tang, Wenjia Gu and Zhongyuan Liu

This paper delves into cross-border E-business, unraveling its intricate dynamics and forecasting its future trajectory.

Abstract

Purpose

This paper delves into cross-border E-business, unraveling its intricate dynamics and forecasting its future trajectory.

Design/methodology/approach

This paper projects the prospective market size of cross-border E-business in China for the year 2023 using the GM (1,1) gray forecasting model. Furthermore, to enhance the analysis, the paper attempts to simulate and forecast the size of China’s cross-border E-business sector using the GM (1,3) gray model. This extended model considers not only the historical trends of cross-border E-business but also the growth patterns of GDP and the digital economy.

Findings

The forecast indicates a market size of 18,760 to 18,934 billion RMB in 2023, aligning with the consistent growth observed in previous years. This suggests a sustained positive trajectory for cross-border E-business.

Originality/value

Cross-border e-commerce critically shapes China’s global integration and traditional industry development. The research in this paper provides insights beyond statistical trends, contributing to a nuanced understanding of the pivotal role played by cross-border e-commerce in shaping China’s economic future.

Details

Journal of Internet and Digital Economics, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2752-6356

Keywords

Open Access
Article
Publication date: 24 August 2023

Andrew Ebekozien, Wellington Didibhuku Thwala, Clinton Ohis Aigbavboa and Mohamad Shaharudin Samsurijan

Studies showed that construction digitalisation could prevent or mitigate accidents rate on sites. Digitalisation applications may prevent or mitigate building project collapse…

Abstract

Purpose

Studies showed that construction digitalisation could prevent or mitigate accidents rate on sites. Digitalisation applications may prevent or mitigate building project collapse (BPC) but with some encumbrances, especially in developing countries. There is a paucity of research on digital technologies application to prevent or mitigate BPC in Nigeria. Thus, the research aims to explore the perceived barriers that may hinder digital technologies from preventing or mitigating building collapse and recommend measures to improve technology applications during development.

Design/methodology/approach

The study is exploratory because of the unexplored approach. The researchers collected data from knowledgeable participants in digitalisation and building collapse in Nigeria. The research employed a phenomenology approach and analysed collected data via a thematic approach. The study achieved saturation at the 29th interviewee.

Findings

Findings show that lax construction digitalisation implementation, absence of regulatory framework, lax policy, unsafe fieldworkers' behaviours, absence of basic infrastructure, government attitude, hesitation to implement and high technology budget, especially in developing countries, are threats to curbing building collapse menace via digitalisation. The study identified technologies relevant to preventing or mitigating building collapse. Also, it proffered measures to prevent or mitigate building collapse via improved digital technology applications during development.

Originality/value

This research contributes to the construction digitalisation literature, especially in developing countries, and investigates the perceived barriers that may hinder digital technologies usage in preventing or mitigating building collapse in Nigeria.

Details

Engineering, Construction and Architectural Management, vol. 31 no. 13
Type: Research Article
ISSN: 0969-9988

Keywords

Open Access
Article
Publication date: 25 December 2023

Thomas Trabert, Luca Doerr and Claudia Lehmann

The organizational digital transformation (ODT) in companies presents small and medium-sized enterprises (SMEs) – who remain at the beginning of this transformation – with the…

1127

Abstract

Purpose

The organizational digital transformation (ODT) in companies presents small and medium-sized enterprises (SMEs) – who remain at the beginning of this transformation – with the challenge of offering digital services based on sensor technologies. Against this backdrop, the present paper identifies ways SMEs can enable digital servitization through sensor technology and defines the possible scope of the organizational transformation process.

Design/methodology/approach

Around 21 semi-structured interviews were conducted with experts from different hierarchical levels across the German manufacturing SME ecosystem. Using the Gioia methodology, fields of action were identified by focusing on influencing factors and opportunities for developing these digital services to offer them successfully in the future.

Findings

The complexity of existing sensor offerings must be mastered, and employees' (data) understanding of the technology has increased. Knowledge gaps, which mainly relate to technical and organizational capabilities, must be overcome. The potential of sensor technology was considered on an individual, technical and organizational level. To enable the successful implementation of service offerings based on sensor technology, all relevant stakeholders in the ecosystem must network to facilitate shared value creation. This requires standardized technical and procedural adaptations and is an essential prerequisite for data mining.

Originality/value

Based on this study, current problem areas were analyzed, and potentials that create opportunities for offering digital sensor services to manufacturing SMEs were identified. The identified influencing factors form a conceptual framework that supports SMEs' future development of such services in a structured manner.

Details

European Journal of Innovation Management, vol. 27 no. 9
Type: Research Article
ISSN: 1460-1060

Keywords

Open Access
Article
Publication date: 1 April 2024

Basmah Almekhled and Helen Petrie

This study investigated the attitudes and concerns of Saudi higher educational institution (HEI) academics about privacy and security in online teaching during the COVID-19…

Abstract

Purpose

This study investigated the attitudes and concerns of Saudi higher educational institution (HEI) academics about privacy and security in online teaching during the COVID-19 pandemic.

Design/methodology/approach

Online Questionnaire questionnaire was designed to explore Saudi HEI academic’s attitudes and concerns about privacy and security issues in online teaching. The questionnaire asked about attitudes and concerns held before the pandemic and since the pandemic. The questionnaire included four sections. At the beginning of the questionnaire, participants were asked what the phrase “online privacy and security” meant to them, to gain an initial understanding of what it meant to academics. A definition for what we intended for the survey was then provided: “that a person’s data, including their identity, is not accessible to anyone other than themselves and others whom they have authorised and that their computing devices work properly and are free from unauthorised interference” (based on my reading of a range of sources, e.g. Schatz et al., 2017; Steinberg, 2019; NCS; Windley, 2005). This was to ensure that participants did understand what I was asking about in subsequent sections.

Findings

This study investigated the attitudes and concerns of Saudi HEI academics about privacy and security in online teaching during the COVID-19 pandemic. The findings provide several key insights: Key aspects of online privacy and security for Saudi HEI academics: Saudi HEI academic’s notion of online privacy and security is about the protection of personal data, preventing unauthorized access to data and ensuring the confidentiality and integrity of data. This underscores the significance of robust measures to safeguard sensitive information in online teaching, but also the need to make academics aware of the other aspects of online privacy and security. Potential to improve policies and training about online privacy and security in Saudi HEIs: Although many participants were aware of the online privacy and security policies of their HEI, only a small percentage had received training in this area. Thus, there is a need to improve the development and dissemination of policies and to provide academics with appropriate training in this area and encourage them to take available training. Use of videoconferencing and chat technologies and cultural sensitivities: The study highlighted moderate levels of concern among Saudi HEI academics regarding the use of videoconferencing and online chat technologies, and their concerns about cultural factors around the use of these technologies. This emphasizes the need for online teaching and the growing use of technologies in such teaching to respect cultural norms and preferences, highlighting the importance of fostering a culturally sensitive approach to technology deployment and use. Surprising low webcam use: An unexpected finding is the low use of webcams by both academics and students during online teaching sessions, prompting a need for a deeper understanding of the dynamics surrounding webcam engagement in such sessions. This calls for a reevaluation of the effectiveness of webcam use in the teaching process and underscores the importance of exploring methods for enhancing engagement and interaction in online teaching. In summary, this paper investigated the attitudes and concerns about privacy and security in the online teaching of Saudi HEI academics during the coronavirus pandemic. The study reveals areas where further research and policy development can enhance the online teaching experience. As the education landscape continues to evolve, institutions must remain proactive in addressing the concerns of their academics while fostering a culturally sensitive approach to technology deployment.

Research limitations/implications

One limitation of this study is the relatively small qualitative data sample, despite the adequate size of the sample including 36 academics from various Saudi Arabian HEIs for quantitative analysis. It was necessary to make the most of the open-ended questions optional – participants did not have to answer about concerns if they did not want to, as we did not want to make the questionnaire too long and onerous to complete. Consequently, the number of academics responding to the open-ended questions was limited, emphasizing the need for additional data and alternative research methods to further these issues. The study was focused on investigating the concerns of HEI Saudi academics, recognizing that the attitudes and concerns of academics in other countries may differ. Furthermore, the research also includes an exploration of the changes in academic attitudes and concerns before and since the COVID-19 pandemic, which will be the subject of further data analysis.

Originality/value

This research delves into Saudi HEI academics' perceptions and concerns regarding privacy and security in online education during the COVID-19 Pandemic. Notably, it highlights the moderate priority placed on online privacy and security, the unexpectedly low usage of webcams and the potential for enhancing policies and training. The study emphasizes the necessity for comprehensive measures to protect sensitive data and the importance of tailored policies for educators. It also underscores the need for a more nuanced understanding of webcam usage dynamics, offering valuable insights for institutions aiming to improve online education and address educators' concerns amidst evolving educational landscapes.

Open Access
Article
Publication date: 15 January 2024

Christine Prince, Nessrine Omrani and Francesco Schiavone

Research on online user privacy shows that empirical evidence on how privacy literacy relates to users' information privacy empowerment is missing. To fill this gap, this paper…

1383

Abstract

Purpose

Research on online user privacy shows that empirical evidence on how privacy literacy relates to users' information privacy empowerment is missing. To fill this gap, this paper investigated the respective influence of two primary dimensions of online privacy literacy – namely declarative and procedural knowledge – on online users' information privacy empowerment.

Design/methodology/approach

An empirical analysis is conducted using a dataset collected in Europe. This survey was conducted in 2019 among 27,524 representative respondents of the European population.

Findings

The main results show that users' procedural knowledge is positively linked to users' privacy empowerment. The relationship between users' declarative knowledge and users' privacy empowerment is partially supported. While greater awareness about firms and organizations practices in terms of data collections and further uses conditions was found to be significantly associated with increased users' privacy empowerment, unpredictably, results revealed that the awareness about the GDPR and user’s privacy empowerment are negatively associated. The empirical findings reveal also that greater online privacy literacy is associated with heightened users' information privacy empowerment.

Originality/value

While few advanced studies made systematic efforts to measure changes occurred on websites since the GDPR enforcement, it remains unclear, however, how individuals perceive, understand and apply the GDPR rights/guarantees and their likelihood to strengthen users' information privacy control. Therefore, this paper contributes empirically to understanding how online users' privacy literacy shaped by both users' declarative and procedural knowledge is likely to affect users' information privacy empowerment. The study empirically investigates the effectiveness of the GDPR in raising users' information privacy empowerment from user-based perspective. Results stress the importance of greater transparency of data tracking and processing decisions made by online businesses and services to strengthen users' control over information privacy. Study findings also put emphasis on the crucial need for more educational efforts to raise users' awareness about the GDPR rights/guarantees related to data protection. Empirical findings also show that users who are more likely to adopt self-protective approaches to reinforce personal data privacy are more likely to perceive greater control over personal data. A broad implication of this finding for practitioners and E-businesses stresses the need for empowering users with adequate privacy protection tools to ensure more confidential transactions.

Details

Information Technology & People, vol. 37 no. 8
Type: Research Article
ISSN: 0959-3845

Keywords

Open Access
Article
Publication date: 19 January 2024

Roosa Amanda Lambin and Milla Nyyssölä

Mainland Tanzania has seen two decades of significant social policy reforms and transformations in its social and economic structures, whilst the country continues to grapple with…

482

Abstract

Purpose

Mainland Tanzania has seen two decades of significant social policy reforms and transformations in its social and economic structures, whilst the country continues to grapple with persisting gender inequalities. This article examines Tanzania's social policy developments from a gender perspective. The authors analyse the level, reach and quality of social policy delivery to working-age women across the areas of health policy, social protection and employment policy during 2000–2021.

Design/methodology/approach

The article draws on qualitative research deploying the scoping review method. The data consist of diverse secondary materials, including academic publications, government policy documents, relevant statistics and other types of “grey” literature.

Findings

Tanzania has made significant advancements in the legal frameworks around welfare provision and has instituted increasingly gender-responsive government policy plans. The health and social protection sectors, in particular, have witnessed the introduction of large-scale measures expanding social policy implementation. However, social policy delivery remains two-tiered, with differences in provisions for women in the formal and informal sectors.

Originality/value

Social policy delivery and implementation have increased and diversified in Sub-Saharan Africa (SSA) during the new millennium, with a growing integration of gender-specific policy objectives. However, limited social policy scholarship has focused on the gendered effects of broader social policy models in SSA. The article remedies the concomitant knowledge gaps by examining various social policies and their impacts on working-age women in Mainland Tanzania. The authors also engage with the theoretical welfare regime literature and present an analytical framework for gender-sensitive assessment of emerging social policy models in the Global South.

Details

International Journal of Sociology and Social Policy, vol. 44 no. 13/14
Type: Research Article
ISSN: 0144-333X

Keywords

Open Access
Article
Publication date: 26 April 2024

Marcus Gerdin, Ella Kolkowska and Åke Grönlund

Research on employee non-/compliance to information security policies suffers from inconsistent results and there is an ongoing discussion about the dominating survey research…

Abstract

Purpose

Research on employee non-/compliance to information security policies suffers from inconsistent results and there is an ongoing discussion about the dominating survey research methodology and its potential effect on these results. This study aims to add to this discussion by investigating discrepancies between what the authors claim to measure (theoretical properties of variables) and what they actually measure (respondents’ interpretations of the operationalized variables). This study asks: How well do respondents’ interpretations of variables correspond to their theoretical definitions? What are the characteristics of any discrepancies between variable definitions and respondent interpretations?

Design/methodology/approach

This study is based on in-depth interviews with 17 respondents from the Swedish public sector to understand how they interpret questionnaire measurement items operationalizing the variables Perceived Severity from Protection Motivation Theory and Attitude from Theory of Planned Behavior.

Findings

The authors found that respondents’ interpretations in many cases differ substantially from the theoretical definitions. Overall, the authors found four principal ways in which respondents interpreted measurement items – referred to as property contextualization, extension, alteration and oscillation – each implying more or less (dis)alignment with the intended theoretical properties of the two variables examined.

Originality/value

The qualitative method used proved vital to better understand respondents’ interpretations which, in turn, is key for improving self-reporting measurement instruments. To the best of the authors’ knowledge, this study is a first step toward understanding how precise and uniform definitions of variables’ theoretical properties can be operationalized into effective measurement items.

Details

Information & Computer Security, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2056-4961

Keywords

Access

Only Open Access

Year

Last 3 months (193)

Content type

1 – 10 of 193