Search results

1 – 10 of 70
Open Access
Article
Publication date: 24 November 2023

Ornella Tanga Tambwe, Clinton Ohis Aigbavboa and Opeoluwa Akinradewo

Data represents a critical resource that enables construction companies’ success; thus, its management is very important. The purpose of this study is to assess the benefits of…

Abstract

Purpose

Data represents a critical resource that enables construction companies’ success; thus, its management is very important. The purpose of this study is to assess the benefits of construction data risks management (DRM) in the construction industry (CI).

Design/methodology/approach

This study adopted a quantitative method and collected data from various South African construction professionals with the aid of an e-questionnaire. These professionals involve electrical engineers, quantity surveyors, architects and mechanical, as well as civil engineers involved under a firm, or organisation within the province of Gauteng, South Africa. Standard deviation, mean item score, non-parametric Kruskal–Wallis H test and exploratory factor analysis were used to analyse the retrieved data.

Findings

The findings revealed that DRM enhances project and company data availability, promotes confidentiality and enhances integrity, which are the primary benefits of DRM that enable the success of project delivery.

Research limitations/implications

The research was carried out only in the province of Gauteng due to COVID-19 travel limitations.

Practical implications

The construction companies will have their data permanently in their possession and no interruption will be seen due to data unavailability, which, in turn, will allow long-term and overall pleasant project outcomes.

Originality/value

This study seeks to address the benefits of DRM in the CI to give additional knowledge on risk management within the built environment to promote success in every project.

Details

Journal of Engineering, Design and Technology , vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1726-0531

Keywords

Open Access
Article
Publication date: 4 December 2023

Ignat Kulkov, Julia Kulkova, Daniele Leone, René Rohrbeck and Loick Menvielle

The purpose of this study is to examine the role of artificial intelligence (AI) in transforming the healthcare sector, with a focus on how AI contributes to entrepreneurship and…

1125

Abstract

Purpose

The purpose of this study is to examine the role of artificial intelligence (AI) in transforming the healthcare sector, with a focus on how AI contributes to entrepreneurship and value creation. This study also aims to explore the potential of combining AI with other technologies, such as cloud computing, blockchain, IoMT, additive manufacturing and 5G, in the healthcare industry.

Design/methodology/approach

Exploratory qualitative methodology was chosen to analyze 22 case studies from the USA, EU, Asia and South America. The data source was public and specialized podcast platforms.

Findings

The findings show that combining technologies can create a competitive advantage for technology entrepreneurs and bring about transitions from simple consumer devices to actionable healthcare applications. The results of this research identified three main entrepreneurship areas: 1. Analytics, including staff reduction, patient prediction and decision support; 2. Security, including protection against cyberattacks and detection of atypical cases; 3. Performance optimization, which, in addition to reducing the time and costs of medical procedures, includes staff training, reducing capital costs and working with new markets.

Originality/value

This study demonstrates how AI can be used with other technologies to cocreate value in the healthcare industry. This study provides a conceptual framework, “AI facilitators – AI achievers,” based on the findings and offer several theoretical contributions to academic literature in technology entrepreneurship and technology management and industry recommendations for practical implication.

Details

International Journal of Entrepreneurial Behavior & Research, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1355-2554

Keywords

Open Access
Article
Publication date: 8 September 2023

Youssef Malhouni and Charif Mabrouki

The purpose of this study is to analyze the challenges encountered by international nongovernmental organizations (INGOs) operating in armed conflicts within the Democratic…

1057

Abstract

Purpose

The purpose of this study is to analyze the challenges encountered by international nongovernmental organizations (INGOs) operating in armed conflicts within the Democratic Republic of the Congo (DRC) and the Central African Republic (CAR). Through a 20-month fieldwork analysis, this research maps logistical risks and highlights key obstacles on the ground for successful humanitarian deployments in dynamically changing and complex environments. The study brings together academics and practitioners, providing practical and concrete recommendations for nongovernmental organizations (NGOs) to focus on in the conflict zones studied.

Design/methodology/approach

Using a mixed-methods approach that combines qualitative and quantitative methods, this research provides valuable insights into the challenges faced by INGOs in conflict zones. After collecting data from the field, including interviews with key stakeholders and on-the-ground observations, the data analysis uses software tools such as Text Analysis Markup System analyzer and Macbeth. By adhering to ethical principles and incorporating a reflexive analysis, the study sheds light on the multidimensional nature of successful humanitarian deployments.

Findings

The primary risk in all armed conflict zones, including the DRC and CAR, is insecurity. However, to achieve a successful humanitarian deployment in such contexts, a multidimensional approach is required. This involves first securing the acceptance of local communities and conflict parties, which can be achieved through a deep understanding of both political and customary structures, with a focus on respecting key engagement leaders. Sustainability also plays a crucial role, and NGOs must maintain a secure stock of energy and provide greater initiative for on-the-ground managers to meet the expressed needs of beneficiary populations and involve them from the planning stage onwards. Finally, effective communication, cooperation and collaboration with United Nations Office for the Coordination of Humanitarian Affairs are essential to overcome procurement, technical and security risks, particularly during the initial deployment phases.

Originality/value

This study provides an illustration of the uncommon practice of conducting collaborative research in humanitarian settings amidst two neighboring areas of armed conflict. The authors identified 268 common risk factors across eight categories during five deployment phases. To analyze these risks based on criticality and NGO responsiveness, the authors used a multicriteria method. This approach allowed the authors to validate unanimous judgments, resulting in valuable insights and concrete recommendations.

Details

Journal of Humanitarian Logistics and Supply Chain Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2042-6747

Keywords

Open Access
Article
Publication date: 26 April 2024

Marcus Gerdin, Ella Kolkowska and Åke Grönlund

Research on employee non-/compliance to information security policies suffers from inconsistent results and there is an ongoing discussion about the dominating survey research…

Abstract

Purpose

Research on employee non-/compliance to information security policies suffers from inconsistent results and there is an ongoing discussion about the dominating survey research methodology and its potential effect on these results. This study aims to add to this discussion by investigating discrepancies between what the authors claim to measure (theoretical properties of variables) and what they actually measure (respondents’ interpretations of the operationalized variables). This study asks: How well do respondents’ interpretations of variables correspond to their theoretical definitions? What are the characteristics of any discrepancies between variable definitions and respondent interpretations?

Design/methodology/approach

This study is based on in-depth interviews with 17 respondents from the Swedish public sector to understand how they interpret questionnaire measurement items operationalizing the variables Perceived Severity from Protection Motivation Theory and Attitude from Theory of Planned Behavior.

Findings

The authors found that respondents’ interpretations in many cases differ substantially from the theoretical definitions. Overall, the authors found four principal ways in which respondents interpreted measurement items – referred to as property contextualization, extension, alteration and oscillation – each implying more or less (dis)alignment with the intended theoretical properties of the two variables examined.

Originality/value

The qualitative method used proved vital to better understand respondents’ interpretations which, in turn, is key for improving self-reporting measurement instruments. To the best of the authors’ knowledge, this study is a first step toward understanding how precise and uniform definitions of variables’ theoretical properties can be operationalized into effective measurement items.

Details

Information & Computer Security, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2056-4961

Keywords

Open Access
Article
Publication date: 10 June 2020

Mona Soliman Gadelmola

The escalation of Turkish intervention in Arab internal affairs before and after the revolutions of the Arab Spring, particularly the military intervention. Sometimes Ankara…

2827

Abstract

Purpose

The escalation of Turkish intervention in Arab internal affairs before and after the revolutions of the Arab Spring, particularly the military intervention. Sometimes Ankara threatens with military intervention and sometimes establishes large military bases in Arab countries: Qatar, Somalia and Iraq. Moreover, it carries out extensive military operations within the borders of some Arab countries such as Iraq and Syria. This type of behavior requires a study that takes into consideration the reasons of such behavior and future implications on the relations between the Arab and Turkish parties.

Design/methodology/approach

The theoretical framework of the study will follow neorealism, as the basis for understanding Turkish pragmatic foreign policy adopted in managing its international relations and interests with various countries.

Findings

The situation in Afrin after a year of Turkish occupation confirms this. Erdogan may not go ahead with a new military operation in east Euphrates and northern Syria. He may prefer instead he may deem it better to control the safe area in the north through the revival of the agreement of Adana of 1998. However, Turkey's desire to control northern Syria, which represents a quarter of the country, faces tough resistance of Turkish groups, Russian-Syrian rejection and European-American resentment. Control of the Syrian north may be subject to concessions and consensus among these powers without excluding any of them.

Research limitations/implications

States in the international system, such as companies in the local economy, have the same main interest: that’s survival. It is worth noting that Waltz’s neorealistic theory cannot be applied to domestic national politics. It cannot contribute to the development of state policies relating to its international and internal affairs. His theory only helps to explain the reason behind the similar behavior of countries despite having different forms of governments and diversity of political ideologies. It also explains why the comprehensive international relations have not changed despite the growing decentralization of these countries.

Originality/value

How does neorealism explain Turkish military intervention in Syria since 2016?

Details

Review of Economics and Political Science, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2356-9980

Keywords

Open Access
Article
Publication date: 16 April 2024

Natile Nonhlanhla Cele and Sheila Kwenda

The purpose of the study is to identify cybersecurity threats that hinder the adoption of digital banking and provide sustainable strategies to combat cybersecurity risks in the…

Abstract

Purpose

The purpose of the study is to identify cybersecurity threats that hinder the adoption of digital banking and provide sustainable strategies to combat cybersecurity risks in the banking industry.

Design/methodology/approach

Systematic literature review guidelines were used to conduct a quantitative synthesis of empirical evidence regarding the impact of cybersecurity threats and risks on the adoption of digital banking.

Findings

A total of 84 studies were initially examined, and after applying the selection and eligibility criteria for this systematic review, 58 studies were included. These selected articles consistently identified identity theft, malware attacks, phishing and vishing as significant cybersecurity threats that hinder the adoption of digital banking.

Originality/value

With the country’s banking sector being new in this area, this study contributes to the scant literature on cyber security, which is mostly in need due to the myriad breaches that the industry has already suffered thus far.

Details

Journal of Financial Crime, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1359-0790

Keywords

Open Access
Article
Publication date: 27 February 2024

Ghadi Saad

The purpose of this study is to investigate the impact of terrorist attacks on the volatility and returns of the stock market in Tunisia.

Abstract

Purpose

The purpose of this study is to investigate the impact of terrorist attacks on the volatility and returns of the stock market in Tunisia.

Design/methodology/approach

The employed sample comprises 1250 trading day from the Tunisian stock index (Tunindex) and stock closing prices of 64 firms listed on the Tunisian stock market (TSM) from January 2011 to October 2015. The research opts for the general autoregressive conditional heteroscedasticity (GARCH) and exponential generalized conditional heteroscedasticity (EGARCH) models framework in addition to the event study method to further assess the effect of terrorism on the Tunisian equity market.

Findings

The baseline results document a substantive impact of terrorism on the returns and volatility of the TSM index. In more details, the findings of the event study method show negative significant effects on mean abnormal returns with different magnitudes over the events dates. The outcomes propose that terrorism profoundly altered the behavior of the stock market and must receive sufficient attention in order to protect the financial market in Tunisia.

Originality/value

Very few evidence is found on the financial effects of terrorism over transition to democracy cases. This paper determines the salient reaction of the stock market to terrorism during democratic transition. The findings of this study shall have relevant implications for stock market participants and policymakers.

Details

LBS Journal of Management & Research, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0972-8031

Keywords

Open Access
Article
Publication date: 16 July 2021

Nikolay Andreevich Moldovyan and Dmitriy Nikolaevich Moldovyan

The practical purpose of this research is to propose a candidate for post-quantum signature standard that is free of significant drawback of the finalists of the NIST world…

Abstract

Purpose

The practical purpose of this research is to propose a candidate for post-quantum signature standard that is free of significant drawback of the finalists of the NIST world competition, which consists in the large size of the signature and the public key. The practical purpose is to propose a fundamentally new method for development of algebraic digital signature algorithms.

Design/methodology/approach

The proposed method is distinguished by the use of two different finite commutative associative algebras as a single algebraic support of the digital signature scheme and setting two different verification equation for a single signature. A single public key is computed as the first and the second public keys, elements of which are computed exponentiating two different generators of cyclic groups in each of the algebras.

Findings

Additionally, a scalar multiplication by a private integer is performed as final step of calculation of every element of the public key. The same powers and the same scalar values are used to compute the first and the second public keys by the same mathematic formulas. Due to such design, the said generators are kept in secret, providing resistance to quantum attacks. Two new finite commutative associative algebras, multiplicative group of which possesses four-dimensional cyclicity, have been proposed as a suitable algebraic support.

Originality/value

The introduced method is novel and includes new techniques for designing algebraic signature schemes that resist quantum attacks. On its base, a new practical post-quantum signature scheme with relatively small size of signature and public key is developed.

Details

Applied Computing and Informatics, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2634-1964

Keywords

Open Access
Article
Publication date: 14 February 2024

Chao Lu and Xiaohai Xin

The promotion of autonomous vehicles introduces privacy and security risks, underscoring the pressing need for responsible innovation implementation. To more effectively address…

Abstract

Purpose

The promotion of autonomous vehicles introduces privacy and security risks, underscoring the pressing need for responsible innovation implementation. To more effectively address the societal risks posed by autonomous vehicles, considering collaborative engagement of key stakeholders is essential. This study aims to provide insights into the governance of potential privacy and security issues in the innovation of autonomous driving technology by analyzing the micro-level decision-making processes of various stakeholders.

Design/methodology/approach

For this study, the authors use a nuanced approach, integrating key stakeholder theory, perceived value theory and prospect theory. The study constructs a model based on evolutionary game for the privacy and security governance mechanism of autonomous vehicles, involving enterprises, governments and consumers.

Findings

The governance of privacy and security in autonomous driving technology is influenced by key stakeholders’ decision-making behaviors and pivotal factors such as perceived value factors. The study finds that the governmental is influenced to a lesser extent by the decisions of other stakeholders, and factors such as risk preference coefficient, which contribute to perceived value, have a more significant influence than appearance factors like participation costs.

Research limitations/implications

This study lacks an investigation into the risk sensitivity of various stakeholders in different scenarios.

Originality/value

The study delineates the roles and behaviors of key stakeholders and contributes valuable insights toward addressing pertinent risk concerns within the governance of autonomous vehicles. Through the study, the practical application of Responsible Innovation theory has been enriched, addressing the shortcomings in the analysis of micro-level processes within the framework of evolutionary game.

Details

Asia Pacific Journal of Innovation and Entrepreneurship, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2071-1395

Keywords

Open Access
Article
Publication date: 13 May 2020

Ahmed Mohamed Hassan

Iraqi society has suffered from loss or fragility of human security since 2003. The developmental policies, programs and plans of the successive Iraqi Governments throughout the…

4768

Abstract

Purpose

Iraqi society has suffered from loss or fragility of human security since 2003. The developmental policies, programs and plans of the successive Iraqi Governments throughout the transitional period have not been able to achieve human security, despite the availability of different resources. They have also not prevented or limited the spread of corruption, according to domestic and international reports. Now the country faces a large phenomenon of corruption and the dilemma of human security loss. This study aims to ascertain the nature of the relationship between the phenomenon of corruption and the dilemma of loss or fragility of human security in Iraq since 2003 to learn about the form of this relationship, how the selected variables contribute to the two phenomena and determine the degree of impact of corruption and its dimensions on human security and its components.

Design/methodology/approach

This research uses the social survey methodology of the sample taken from the Iraqi society and benefits from system analysis approach to identify the inputs and outputs of the variables researched. Moreover, the study uses the case study methodology to collect data and information precisely in an in-depth manner to support qualitative and quantitative analysis and clarifies the situation at the macro level of both phenomena.

Findings

Findings show the prevalence of corruption structurally in the Iraqi state and society. The contribution of dimensions and selected indicators in the spread of corruption and lack of human security varies. Findings also underline a strong statistical correlation between the two variables and their reverse relationship. In other words, the more the corruption is, the less the opportunities of human security are. There is also a strong impact of corruption and its dimensions on the conditions of human security factors.

Practical implications

The paper provides profitable findings and recommendations, which can be used by the Iraqi relevant institutions to eliminate corruption, achieve human security and benefit from its indicators in research and development.

Originality/value

The new addition of this research can be represented by linking the two phenomena and trying to build national standards with the capacity to describe, interpret and predict.

Details

Review of Economics and Political Science, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2356-9980

Keywords

Access

Only content I have access to

Year

Content type

Earlycite article (70)
1 – 10 of 70