Search results
1 – 10 of 682Rafiq Ahmad and Muhammad Rafiq
The digital contents (d-contents) are vulnerable to various threats either natural or manmade. Digital preservation is the plethora of a wide array of strategies necessary for the…
Abstract
Purpose
The digital contents (d-contents) are vulnerable to various threats either natural or manmade. Digital preservation is the plethora of a wide array of strategies necessary for the long-term preservation of digital objects. This study was carried out to assess the digital preservation practices for information resources in university libraries of Pakistan.
Design/methodology/approach
A quantitative survey based on a structured questionnaire was carried out to conduct the study. The questionnaire containing two sets of strategies (general and technical) was distributed amongst the whole population and received 90% response rate.
Findings
Overall, progressive implementation of general digital preservation practices was noted in these libraries like checking the digital collections for viruses, keeping the digital media in fire/water/theft proof locations, restricting unauthorized access, maintaining ideal humidity and temperature, and checking the digital media for functionality. Amongst the technical practices, only replication was in practice at a progressive rate, followed by metadata recording and media refreshing that was sometimes practiced in these libraries. The other technical practices were rarely or never practiced in these libraries. Significant variances in general and technical digital preservation practices were noted based on their physical locations (regional distribution).
Research limitations/implications
The study contributes a comprehensive set of digital preservation practices divided into general and technical types to conduct similar studies in other parts of the world.
Practical implications
The findings stress the need for national and institutional policies, funding streams and skill enhancement of library staff.
Originality/value
The study fills the literature gap and contributes a comprehensive set of digital preservation practices divided into general and technical types to conduct similar studies in other parts of the world.
Peer review
The peer-review history for this article is available at: https://publons.com/publon/10.1108/OIR-02-2023-0074
Details
Keywords
Shweta V. Matey, Dadarao N. Raut, Rajesh B. Pansare and Ravi Kant
Blockchain technology (BCT) can play a vital role in manufacturing industries by providing visibility and real-time transparency. With BCT adoption, manufacturers can achieve…
Abstract
Purpose
Blockchain technology (BCT) can play a vital role in manufacturing industries by providing visibility and real-time transparency. With BCT adoption, manufacturers can achieve higher productivity, better quality, flexibility and cost-effectiveness. The current study aims to prioritize the performance metrics and ranking of enablers that may influence the adoption of BCT in manufacturing industries through a hybrid framework.
Design/methodology/approach
Through an extensive literature review, 4 major criteria with 26 enablers were identified. Pythagorean fuzzy analytical hierarchy process (AHP) method was used to compute the weights of the enablers and the Pythagorean fuzzy combined compromise solution (Co-Co-So) method was used to prioritize the 17-performance metrics. Sensitivity analysis was then carried out to check the robustness of the developed framework.
Findings
According to the results, data security enablers were the most significant among the major criteria, followed by technology-oriented enablers, sustainability and human resources and quality-related enablers. Further, the ranking of performance metrics shows that data hacking complaints per year, data storage capacity and number of advanced technologies available for BCT are the top three important performance metrics. Framework robustness was confirmed by sensitivity analysis.
Practical implications
The developed framework will contribute to understanding and simplifying the BCT implementation process in manufacturing industries to a significant level. Practitioners and managers may use the developed framework to facilitate BCT adoption and evaluate the performance of the manufacturing system.
Originality/value
This study can be considered as the first attempt to the best of the author’s knowledge as no such hybrid framework combining enablers and performance indicators was developed earlier.
Details
Keywords
Shefali Arora, Ruchi Mittal, Avinash K. Shrivastava and Shivani Bali
Deep learning (DL) is on the rise because it can make predictions and judgments based on data that is unseen. Blockchain technologies are being combined with DL frameworks in…
Abstract
Purpose
Deep learning (DL) is on the rise because it can make predictions and judgments based on data that is unseen. Blockchain technologies are being combined with DL frameworks in various industries to provide a safe and effective infrastructure. The review comprises literature that lists the most recent techniques used in the aforementioned application sectors. We examine the current research trends across several fields and evaluate the literature in terms of its advantages and disadvantages.
Design/methodology/approach
The integration of blockchain and DL has been explored in several application domains for the past five years (2018–2023). Our research is guided by five research questions, and based on these questions, we concentrate on key application domains such as the usage of Internet of Things (IoT) in several applications, healthcare and cryptocurrency price prediction. We have analyzed the main challenges and possibilities concerning blockchain technologies. We have discussed the methodologies used in the pertinent publications in these areas and contrasted the research trends during the previous five years. Additionally, we provide a comparison of the widely used blockchain frameworks that are used to create blockchain-based DL frameworks.
Findings
By responding to five research objectives, the study highlights and assesses the effectiveness of already published works using blockchain and DL. Our findings indicate that IoT applications, such as their use in smart cities and cars, healthcare and cryptocurrency, are the key areas of research. The primary focus of current research is the enhancement of existing systems, with data analysis, storage and sharing via decentralized systems being the main motivation for this integration. Amongst the various frameworks employed, Ethereum and Hyperledger are popular among researchers in the domain of IoT and healthcare, whereas Bitcoin is popular for research on cryptocurrency.
Originality/value
There is a lack of literature that summarizes the state-of-the-art methods incorporating blockchain and DL in popular domains such as healthcare, IoT and cryptocurrency price prediction. We analyze the existing research done in the past five years (2018–2023) to review the issues and emerging trends.
Details
Keywords
Lahiru Supun Deshan Rathnayaka, Buddha Koralage Malsha Nadeetharu and Udayangani Kulatunga
Documentation plays a key role in navigating the costs of construction projects. Traditional document management systems (TDMS) used in developing countries, however, hinder the…
Abstract
Purpose
Documentation plays a key role in navigating the costs of construction projects. Traditional document management systems (TDMS) used in developing countries, however, hinder the achievement of expected cost targets. Although the electronic document management system (EDMS) has been implemented to improve documentation, the Sri Lankan construction industry has failed to effectively adapt to it. Hence, this study aims to provide strategies for the effective application of EDMS to the cost management of Sri Lankan mega construction projects.
Design/methodology/approach
This study uses a qualitative approach followed by 12 semi-structured expert interviews. Quantity surveying experts were selected through judgemental sampling. Manual content analysis was used to analyse the data.
Findings
The EDMS is more suitable for megaprojects than traditional methods of documentation in terms of functionality, neutrality, interoperability, space, reversibility and delivery speed. However, there are contradictory views about cost and security. Furthermore, five transitional challenges of EDMS have been identified under the three key themes of cost, stakeholder perception and technical difficulties. Four reasons were also identified as causing these five challenges. Seven suggestions were made to deal with these transitional challenges and three key feasible solutions for the Sri Lankan construction industry regarding the EDMS were identified. Development of Sri Lankan software with low initial cost was highlighted as the most feasible solution.
Originality/value
This is a novel study to investigate the applicability of EDMS to cost management mechanisms of megaprojects in Sri Lanka. The findings reveal transitional challenges and appropriate feasible solutions for EDMS adaptation. This can be applied to the cost management of megaprojects in other developing countries as well.
Details
Keywords
Babatunde Abiodun Salami, Muizz Oladapo Sanni-Anibire and Joy Otibhor Olurin
The construction industry in emerging economies have suffered from productivity issues related to poor resource management as a result of theft. Therefore, this study aims to…
Abstract
Purpose
The construction industry in emerging economies have suffered from productivity issues related to poor resource management as a result of theft. Therefore, this study aims to carry out an exploratory factor analysis of the key causes of theft in the construction industry in Nigeria.
Design/methodology/approach
The methodology entailed a review of the literature which identified 58 causes of construction theft. The causes were operationalized through a Likert-scale questionnaire survey, which was revised in a pilot study with ten industry experts. The questionnaire was further distributed to experienced construction professionals in Nigeria. A total of 63 respondents participated in the study, and the results were analyzed through an exploratory factor analysis.
Findings
A Kruskal–Wallis test showed no difference in perception of the various group of respondents, while Cronbach alpha test indicated an acceptable level of internal consistency and reliability. The top causes from the literature review were determined through descriptive statistics. However, a Kaiser–Meyer–Olkin measurement resulted in the exclusion of ten causes, and exploratory factor analysis yielded twenty causes in six dominant factors that together account for 55.7% of the variance. The six dominant factors were general theft prevention measures, site security measures, site layout planning, management of materials and equipment, construction project management and policy and safety management.
Originality/value
The limited amount of research on construction site theft in emerging construction environments such as Nigeria contributes to poor construction productivity. This study advances our knowledge of construction site theft and is of significant value to construction stakeholders in effective material and resource management through theft mitigation measures.
Details
Keywords
The purpose of this study is to comprehensively explore the password manager adoption landscape, delving into crucial factors such as performance, trust, social influence…
Abstract
Purpose
The purpose of this study is to comprehensively explore the password manager adoption landscape, delving into crucial factors such as performance, trust, social influence, self-efficacy, risk perception, security concerns, enjoyment and facilitating conditions. It also aims to contribute meaningful insights to security product research and practice.
Design/methodology/approach
A survey was used to investigate the characteristics of adoption intention for password managers. In total, 156 participants from a public university located in the Midwest region of the USA voluntarily completed the survey. Partial least squares structural equation modeling was used to estimate and validate causal relationships and the proposed research model.
Findings
Through empirical validation, this study demonstrates that constructs such as social influence, web-specific self-efficacy and perceived risk directly impact trust in password managers. Facilitating conditions and perceived security controls are identified as direct influencers on performance expectancy, deviating from the pathways of the traditional framework. Moreover, the model introduces novel elements crucial for comprehending password manager adoption, including “web-specific self-efficacy” and “perceived security control.”
Originality/value
The paper systematically reviews existing research on password managers, shedding light on crucial factors significantly influencing adoption behavior. By introducing deviations from conventional frameworks and theories, the study emphasizes the innovative nature of its model. It also formulates strategies to catalyze wider adoption and promote effective design of password managers, increasing user engagement rates.
Details
Keywords
Saheed Abiola Hamzat, Funke Abosede Ayeni and Jacob Oloruntoba Kutu
Polytechnics in Nigeria are conventional institutions where academic board records are being managed in paper form. It has been observed that accessing these academic board…
Abstract
Purpose
Polytechnics in Nigeria are conventional institutions where academic board records are being managed in paper form. It has been observed that accessing these academic board records is difficult due to factors associated with the absence of preservation techniques and lack of clear-cut conservation practices. This study, therefore, aims to examine the preservation techniques and conservation practices adopted for the management of academic board records in polytechnics in South-West Nigeria.
Design/methodology/approach
This study adopted a qualitative method with the population comprising 54 records management personnel enumerated in the four selected polytechnics in South-West Nigeria. Triangulation method (questionnaire, interview and observation checklist) was used for data collection. The responses were analysed with descriptive statistics and thematic analysis.
Findings
Findings revealed that photocopying, binding and use of insecticides were the most rated preservation techniques adopted. The security and shelving of academic board records to allow for free flow of air were the most available conservation practices, whereas staff training was not adequately available. The topmost rated constraints were non-challant attitude of personnel in-charge, insufficient funds and inadequate infrastructure.
Research limitations/implications
This study concluded that preservation and conservation practices are vital in the management of academic board records in polytechnics in South-West Nigeria. For efficient and effective management of academic board records, modern-day preservation and conservation practices need to be adopted.
Originality/value
This paper fulfils an identified need to study how preservation and conservation practices adopted for the management of academic board records in Nigerian polytechnics.
Details
Keywords
Oluwatoyin.A. Matthew, Romanus Osabohien, Emmanuel O. Amoo and Bosede C. Olopade
Post-harvest losses are becoming a huge issue globally and predominantly severe in developing countries. Food losses decrease farm income by 15% for about 480m small-scale farming…
Abstract
Purpose
Post-harvest losses are becoming a huge issue globally and predominantly severe in developing countries. Food losses decrease farm income by 15% for about 480m small-scale farming households. With technology adoption, particularly, Information and Communication Technology (ICT) usage, minimising post-harvest losses will be more effective, because of its ability to build households’ human development by bridging the information gap.
Design/methodology/approach
This study empirically examines the impact of ICT usage on post-harvest losses in Nigeria, utilising Wave 4 (2018/2019) of the Living Standards Measurement Studies (LSMS), Integrated Survey on Agriculture (ISA). The study engages the Logit regression and Propensity Score Matching (PSM) to analyse the data.
Findings
The findings show that post-harvest losses constitute about 38% of household agricultural production. In addition, it shows that the influence of ICT is statistically significant and positive in reducing post-harvest losses.
Research limitations/implications
It implies that access to mobile phones and the Internet by households helps in developing their human capital through information access, for example, by linking them to the market and enhancing value chain participation. In addition, the implication is that mobile phone and Internet access contribute 1.87% and 2.68%, respectively, to reducing post-harvest losses. The findings suggest that there is a need for the government to improve support mechanisms for ICT usage among farming households.
Social implications
The study contributes to the society by examining how the well-being of farmers can be improved upon in order to increase their productivity.
Originality/value
The study on the contribution of ICT to post-harvest losses is relatively sparse in the extant literature. Therefore, this study is among the very few to empirically examine the impact of different ICT indicators, using the LSMS-ISA (2019) data and engaging propensity matching, while focusing on the household heads.
Details
Keywords
Trinity McNicol, Bailey Carthouser, Ivano Bongiovanni and Sasenka Abeysooriya
The purpose of this study is to address the generalised lack of guidance on ethical treatment of corporate (e.g. non-research) data in higher education institutions, by focusing…
Abstract
Purpose
The purpose of this study is to address the generalised lack of guidance on ethical treatment of corporate (e.g. non-research) data in higher education institutions, by focusing on the case of the University of Queensland (Brisbane, Australia). No actionable framework is currently available in the country to govern the ethical usage of corporate data. As such, this research takes a stakeholder-centred approach to data ethics; the lived experience of the stakeholders involved coupled with a theory-based ethical framework allowed the authors build to build a framework to guide ethical data practice.
Design/methodology/approach
Adopting a revised canonical action research approach focused on intervention on the context, the authors conducted a review of the literature on ethical usage of data in higher education institutions; administered one survey to university students (n = 168); and facilitated three workshops with professional staff (two) and students (one).
Findings
Collected data highlighted how, among other themes, the role and ethical importance of transparency was the dominant claim among all stakeholder groups. Findings helped the authors develop an Enhanced Enterprise Data Ethics Framework (EEDEF) emphasising transparency and stakeholder-centricity.
Practical implications
Legislation is the driver to regulate the use of corporate data in higher education; however, this can be problematic because legislation is retrospective, lacks normativity and offers scarce directions for cases that do not exactly follow within the legislative mandate. In light of these regulatory limitations, the authors’ EEDEF offers operators guidance on how to ethically manage corporate data in the higher education environment.
Originality/value
This study fills gaps in praxis and theory; that is the lack of literature and guiding ethical frameworks to inform data practice in higher education. This research fosters a more ethical data management by virtue of genuine and authentic engagement with stakeholders and emphasises the importance of strategic decision-making and maturity of data culture in the higher education sector.
Details
Keywords
Sherin Kunhibava, Aishath Muneeza, Zakariya Mustapha, Mohammad Ershadul Karim and Auwal Adam Sa’ad
This study aims to explore several challenges in the use of regulatory technologies (RegTech) in Islamic and conventional financial markets and share recommendations in this…
Abstract
Purpose
This study aims to explore several challenges in the use of regulatory technologies (RegTech) in Islamic and conventional financial markets and share recommendations in this regard.
Design/methodology/approach
A qualitative research methodology was used to identify the existing challenges. Literature was reviewed and analyzed, and seven experts were interviewed or consulted online and their feedback examined. The judgment of the case B2C2 Ltd v Quoine Pte Ltd. was reviewed.
Findings
This study reveals a lack of relevant regulatory frameworks capable of meeting some of the evolving challenges, lack of awareness among market players and lack of expertise in RegTech. The list of additional challenges includes the issue of legacy technology, the weaknesses of human programmers and the need for a multifaceted solution for compliance requirements.
Research limitations/implications
This study notes the novelty of RegTech in the financial world, especially in the Islamic financial market. Thus, there is a dearth of relevant literature. This study assists relevant conventional and Islamic financial market entities and authorities in determining the potential impact of RegTech on their respective businesses and the financial system.
Practical implications
This study proffers recommendations to assist in addressing the challenges facing its users and paving the way for innovative solutions that will facilitate and enhance the use of RegTech in financial markets. Regulators and other stakeholders of the financial industry will learn from the challenges identified and can review the recommendations for adoption. Apart from that, the decision of B2C2 Ltd v Quoine has practical implications for RegTech users, as the court in B2C2 Ltd v Quoine accessed the “knowledge” of the programmers of deterministic software at the time of the coding.
Originality/value
RegTech can offer cost-effective and efficient means to comply with regulations and ensure the accuracy of the information provided to regulators. This study provides a better understanding of the challenges associated with its use. The recommendations include enactment of a blueprint for a digitally enabled regulatory framework, creating awareness of RegTech via stakeholder roundtable discussions, development of human talent, formulating human governance standards and finding innovative ways to manage risks.
Details