Search results

1 – 10 of 682
Article
Publication date: 5 December 2023

Rafiq Ahmad and Muhammad Rafiq

The digital contents (d-contents) are vulnerable to various threats either natural or manmade. Digital preservation is the plethora of a wide array of strategies necessary for the…

Abstract

Purpose

The digital contents (d-contents) are vulnerable to various threats either natural or manmade. Digital preservation is the plethora of a wide array of strategies necessary for the long-term preservation of digital objects. This study was carried out to assess the digital preservation practices for information resources in university libraries of Pakistan.

Design/methodology/approach

A quantitative survey based on a structured questionnaire was carried out to conduct the study. The questionnaire containing two sets of strategies (general and technical) was distributed amongst the whole population and received 90% response rate.

Findings

Overall, progressive implementation of general digital preservation practices was noted in these libraries like checking the digital collections for viruses, keeping the digital media in fire/water/theft proof locations, restricting unauthorized access, maintaining ideal humidity and temperature, and checking the digital media for functionality. Amongst the technical practices, only replication was in practice at a progressive rate, followed by metadata recording and media refreshing that was sometimes practiced in these libraries. The other technical practices were rarely or never practiced in these libraries. Significant variances in general and technical digital preservation practices were noted based on their physical locations (regional distribution).

Research limitations/implications

The study contributes a comprehensive set of digital preservation practices divided into general and technical types to conduct similar studies in other parts of the world.

Practical implications

The findings stress the need for national and institutional policies, funding streams and skill enhancement of library staff.

Originality/value

The study fills the literature gap and contributes a comprehensive set of digital preservation practices divided into general and technical types to conduct similar studies in other parts of the world.

Peer review

The peer-review history for this article is available at: https://publons.com/publon/10.1108/OIR-02-2023-0074

Details

Online Information Review, vol. 48 no. 4
Type: Research Article
ISSN: 1468-4527

Keywords

Article
Publication date: 17 September 2024

Shweta V. Matey, Dadarao N. Raut, Rajesh B. Pansare and Ravi Kant

Blockchain technology (BCT) can play a vital role in manufacturing industries by providing visibility and real-time transparency. With BCT adoption, manufacturers can achieve…

Abstract

Purpose

Blockchain technology (BCT) can play a vital role in manufacturing industries by providing visibility and real-time transparency. With BCT adoption, manufacturers can achieve higher productivity, better quality, flexibility and cost-effectiveness. The current study aims to prioritize the performance metrics and ranking of enablers that may influence the adoption of BCT in manufacturing industries through a hybrid framework.

Design/methodology/approach

Through an extensive literature review, 4 major criteria with 26 enablers were identified. Pythagorean fuzzy analytical hierarchy process (AHP) method was used to compute the weights of the enablers and the Pythagorean fuzzy combined compromise solution (Co-Co-So) method was used to prioritize the 17-performance metrics. Sensitivity analysis was then carried out to check the robustness of the developed framework.

Findings

According to the results, data security enablers were the most significant among the major criteria, followed by technology-oriented enablers, sustainability and human resources and quality-related enablers. Further, the ranking of performance metrics shows that data hacking complaints per year, data storage capacity and number of advanced technologies available for BCT are the top three important performance metrics. Framework robustness was confirmed by sensitivity analysis.

Practical implications

The developed framework will contribute to understanding and simplifying the BCT implementation process in manufacturing industries to a significant level. Practitioners and managers may use the developed framework to facilitate BCT adoption and evaluate the performance of the manufacturing system.

Originality/value

This study can be considered as the first attempt to the best of the author’s knowledge as no such hybrid framework combining enablers and performance indicators was developed earlier.

Details

Journal of Modelling in Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1746-5664

Keywords

Article
Publication date: 27 February 2024

Shefali Arora, Ruchi Mittal, Avinash K. Shrivastava and Shivani Bali

Deep learning (DL) is on the rise because it can make predictions and judgments based on data that is unseen. Blockchain technologies are being combined with DL frameworks in…

Abstract

Purpose

Deep learning (DL) is on the rise because it can make predictions and judgments based on data that is unseen. Blockchain technologies are being combined with DL frameworks in various industries to provide a safe and effective infrastructure. The review comprises literature that lists the most recent techniques used in the aforementioned application sectors. We examine the current research trends across several fields and evaluate the literature in terms of its advantages and disadvantages.

Design/methodology/approach

The integration of blockchain and DL has been explored in several application domains for the past five years (2018–2023). Our research is guided by five research questions, and based on these questions, we concentrate on key application domains such as the usage of Internet of Things (IoT) in several applications, healthcare and cryptocurrency price prediction. We have analyzed the main challenges and possibilities concerning blockchain technologies. We have discussed the methodologies used in the pertinent publications in these areas and contrasted the research trends during the previous five years. Additionally, we provide a comparison of the widely used blockchain frameworks that are used to create blockchain-based DL frameworks.

Findings

By responding to five research objectives, the study highlights and assesses the effectiveness of already published works using blockchain and DL. Our findings indicate that IoT applications, such as their use in smart cities and cars, healthcare and cryptocurrency, are the key areas of research. The primary focus of current research is the enhancement of existing systems, with data analysis, storage and sharing via decentralized systems being the main motivation for this integration. Amongst the various frameworks employed, Ethereum and Hyperledger are popular among researchers in the domain of IoT and healthcare, whereas Bitcoin is popular for research on cryptocurrency.

Originality/value

There is a lack of literature that summarizes the state-of-the-art methods incorporating blockchain and DL in popular domains such as healthcare, IoT and cryptocurrency price prediction. We analyze the existing research done in the past five years (2018–2023) to review the issues and emerging trends.

Details

International Journal of Quality & Reliability Management, vol. 41 no. 8
Type: Research Article
ISSN: 0265-671X

Keywords

Article
Publication date: 5 December 2023

Lahiru Supun Deshan Rathnayaka, Buddha Koralage Malsha Nadeetharu and Udayangani Kulatunga

Documentation plays a key role in navigating the costs of construction projects. Traditional document management systems (TDMS) used in developing countries, however, hinder the…

Abstract

Purpose

Documentation plays a key role in navigating the costs of construction projects. Traditional document management systems (TDMS) used in developing countries, however, hinder the achievement of expected cost targets. Although the electronic document management system (EDMS) has been implemented to improve documentation, the Sri Lankan construction industry has failed to effectively adapt to it. Hence, this study aims to provide strategies for the effective application of EDMS to the cost management of Sri Lankan mega construction projects.

Design/methodology/approach

This study uses a qualitative approach followed by 12 semi-structured expert interviews. Quantity surveying experts were selected through judgemental sampling. Manual content analysis was used to analyse the data.

Findings

The EDMS is more suitable for megaprojects than traditional methods of documentation in terms of functionality, neutrality, interoperability, space, reversibility and delivery speed. However, there are contradictory views about cost and security. Furthermore, five transitional challenges of EDMS have been identified under the three key themes of cost, stakeholder perception and technical difficulties. Four reasons were also identified as causing these five challenges. Seven suggestions were made to deal with these transitional challenges and three key feasible solutions for the Sri Lankan construction industry regarding the EDMS were identified. Development of Sri Lankan software with low initial cost was highlighted as the most feasible solution.

Originality/value

This is a novel study to investigate the applicability of EDMS to cost management mechanisms of megaprojects in Sri Lanka. The findings reveal transitional challenges and appropriate feasible solutions for EDMS adaptation. This can be applied to the cost management of megaprojects in other developing countries as well.

Details

Journal of Financial Management of Property and Construction , vol. 29 no. 2
Type: Research Article
ISSN: 1366-4387

Keywords

Article
Publication date: 30 August 2024

Babatunde Abiodun Salami, Muizz Oladapo Sanni-Anibire and Joy Otibhor Olurin

The construction industry in emerging economies have suffered from productivity issues related to poor resource management as a result of theft. Therefore, this study aims to…

Abstract

Purpose

The construction industry in emerging economies have suffered from productivity issues related to poor resource management as a result of theft. Therefore, this study aims to carry out an exploratory factor analysis of the key causes of theft in the construction industry in Nigeria.

Design/methodology/approach

The methodology entailed a review of the literature which identified 58 causes of construction theft. The causes were operationalized through a Likert-scale questionnaire survey, which was revised in a pilot study with ten industry experts. The questionnaire was further distributed to experienced construction professionals in Nigeria. A total of 63 respondents participated in the study, and the results were analyzed through an exploratory factor analysis.

Findings

A Kruskal–Wallis test showed no difference in perception of the various group of respondents, while Cronbach alpha test indicated an acceptable level of internal consistency and reliability. The top causes from the literature review were determined through descriptive statistics. However, a Kaiser–Meyer–Olkin measurement resulted in the exclusion of ten causes, and exploratory factor analysis yielded twenty causes in six dominant factors that together account for 55.7% of the variance. The six dominant factors were general theft prevention measures, site security measures, site layout planning, management of materials and equipment, construction project management and policy and safety management.

Originality/value

The limited amount of research on construction site theft in emerging construction environments such as Nigeria contributes to poor construction productivity. This study advances our knowledge of construction site theft and is of significant value to construction stakeholders in effective material and resource management through theft mitigation measures.

Details

International Journal of Building Pathology and Adaptation, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2398-4708

Keywords

Article
Publication date: 16 July 2024

Xiaoguang Tian

The purpose of this study is to comprehensively explore the password manager adoption landscape, delving into crucial factors such as performance, trust, social influence…

Abstract

Purpose

The purpose of this study is to comprehensively explore the password manager adoption landscape, delving into crucial factors such as performance, trust, social influence, self-efficacy, risk perception, security concerns, enjoyment and facilitating conditions. It also aims to contribute meaningful insights to security product research and practice.

Design/methodology/approach

A survey was used to investigate the characteristics of adoption intention for password managers. In total, 156 participants from a public university located in the Midwest region of the USA voluntarily completed the survey. Partial least squares structural equation modeling was used to estimate and validate causal relationships and the proposed research model.

Findings

Through empirical validation, this study demonstrates that constructs such as social influence, web-specific self-efficacy and perceived risk directly impact trust in password managers. Facilitating conditions and perceived security controls are identified as direct influencers on performance expectancy, deviating from the pathways of the traditional framework. Moreover, the model introduces novel elements crucial for comprehending password manager adoption, including “web-specific self-efficacy” and “perceived security control.”

Originality/value

The paper systematically reviews existing research on password managers, shedding light on crucial factors significantly influencing adoption behavior. By introducing deviations from conventional frameworks and theories, the study emphasizes the innovative nature of its model. It also formulates strategies to catalyze wider adoption and promote effective design of password managers, increasing user engagement rates.

Details

Information & Computer Security, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 22 July 2024

Saheed Abiola Hamzat, Funke Abosede Ayeni and Jacob Oloruntoba Kutu

Polytechnics in Nigeria are conventional institutions where academic board records are being managed in paper form. It has been observed that accessing these academic board…

Abstract

Purpose

Polytechnics in Nigeria are conventional institutions where academic board records are being managed in paper form. It has been observed that accessing these academic board records is difficult due to factors associated with the absence of preservation techniques and lack of clear-cut conservation practices. This study, therefore, aims to examine the preservation techniques and conservation practices adopted for the management of academic board records in polytechnics in South-West Nigeria.

Design/methodology/approach

This study adopted a qualitative method with the population comprising 54 records management personnel enumerated in the four selected polytechnics in South-West Nigeria. Triangulation method (questionnaire, interview and observation checklist) was used for data collection. The responses were analysed with descriptive statistics and thematic analysis.

Findings

Findings revealed that photocopying, binding and use of insecticides were the most rated preservation techniques adopted. The security and shelving of academic board records to allow for free flow of air were the most available conservation practices, whereas staff training was not adequately available. The topmost rated constraints were non-challant attitude of personnel in-charge, insufficient funds and inadequate infrastructure.

Research limitations/implications

This study concluded that preservation and conservation practices are vital in the management of academic board records in polytechnics in South-West Nigeria. For efficient and effective management of academic board records, modern-day preservation and conservation practices need to be adopted.

Originality/value

This paper fulfils an identified need to study how preservation and conservation practices adopted for the management of academic board records in Nigerian polytechnics.

Details

Records Management Journal, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0956-5698

Keywords

Article
Publication date: 16 July 2024

Oluwatoyin.A. Matthew, Romanus Osabohien, Emmanuel O. Amoo and Bosede C. Olopade

Post-harvest losses are becoming a huge issue globally and predominantly severe in developing countries. Food losses decrease farm income by 15% for about 480m small-scale farming…

Abstract

Purpose

Post-harvest losses are becoming a huge issue globally and predominantly severe in developing countries. Food losses decrease farm income by 15% for about 480m small-scale farming households. With technology adoption, particularly, Information and Communication Technology (ICT) usage, minimising post-harvest losses will be more effective, because of its ability to build households’ human development by bridging the information gap.

Design/methodology/approach

This study empirically examines the impact of ICT usage on post-harvest losses in Nigeria, utilising Wave 4 (2018/2019) of the Living Standards Measurement Studies (LSMS), Integrated Survey on Agriculture (ISA). The study engages the Logit regression and Propensity Score Matching (PSM) to analyse the data.

Findings

The findings show that post-harvest losses constitute about 38% of household agricultural production. In addition, it shows that the influence of ICT is statistically significant and positive in reducing post-harvest losses.

Research limitations/implications

It implies that access to mobile phones and the Internet by households helps in developing their human capital through information access, for example, by linking them to the market and enhancing value chain participation. In addition, the implication is that mobile phone and Internet access contribute 1.87% and 2.68%, respectively, to reducing post-harvest losses. The findings suggest that there is a need for the government to improve support mechanisms for ICT usage among farming households.

Social implications

The study contributes to the society by examining how the well-being of farmers can be improved upon in order to increase their productivity.

Originality/value

The study on the contribution of ICT to post-harvest losses is relatively sparse in the extant literature. Therefore, this study is among the very few to empirically examine the impact of different ICT indicators, using the LSMS-ISA (2019) data and engaging propensity matching, while focusing on the household heads.

Details

Journal of Agribusiness in Developing and Emerging Economies, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2044-0839

Keywords

Article
Publication date: 29 August 2023

Trinity McNicol, Bailey Carthouser, Ivano Bongiovanni and Sasenka Abeysooriya

The purpose of this study is to address the generalised lack of guidance on ethical treatment of corporate (e.g. non-research) data in higher education institutions, by focusing…

Abstract

Purpose

The purpose of this study is to address the generalised lack of guidance on ethical treatment of corporate (e.g. non-research) data in higher education institutions, by focusing on the case of the University of Queensland (Brisbane, Australia). No actionable framework is currently available in the country to govern the ethical usage of corporate data. As such, this research takes a stakeholder-centred approach to data ethics; the lived experience of the stakeholders involved coupled with a theory-based ethical framework allowed the authors build to build a framework to guide ethical data practice.

Design/methodology/approach

Adopting a revised canonical action research approach focused on intervention on the context, the authors conducted a review of the literature on ethical usage of data in higher education institutions; administered one survey to university students (n = 168); and facilitated three workshops with professional staff (two) and students (one).

Findings

Collected data highlighted how, among other themes, the role and ethical importance of transparency was the dominant claim among all stakeholder groups. Findings helped the authors develop an Enhanced Enterprise Data Ethics Framework (EEDEF) emphasising transparency and stakeholder-centricity.

Practical implications

Legislation is the driver to regulate the use of corporate data in higher education; however, this can be problematic because legislation is retrospective, lacks normativity and offers scarce directions for cases that do not exactly follow within the legislative mandate. In light of these regulatory limitations, the authors’ EEDEF offers operators guidance on how to ethically manage corporate data in the higher education environment.

Originality/value

This study fills gaps in praxis and theory; that is the lack of literature and guiding ethical frameworks to inform data practice in higher education. This research fosters a more ethical data management by virtue of genuine and authentic engagement with stakeholders and emphasises the importance of strategic decision-making and maturity of data culture in the higher education sector.

Details

Information Technology & People, vol. 37 no. 6
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 10 May 2023

Sherin Kunhibava, Aishath Muneeza, Zakariya Mustapha, Mohammad Ershadul Karim and Auwal Adam Sa’ad

This study aims to explore several challenges in the use of regulatory technologies (RegTech) in Islamic and conventional financial markets and share recommendations in this…

Abstract

Purpose

This study aims to explore several challenges in the use of regulatory technologies (RegTech) in Islamic and conventional financial markets and share recommendations in this regard.

Design/methodology/approach

A qualitative research methodology was used to identify the existing challenges. Literature was reviewed and analyzed, and seven experts were interviewed or consulted online and their feedback examined. The judgment of the case B2C2 Ltd v Quoine Pte Ltd. was reviewed.

Findings

This study reveals a lack of relevant regulatory frameworks capable of meeting some of the evolving challenges, lack of awareness among market players and lack of expertise in RegTech. The list of additional challenges includes the issue of legacy technology, the weaknesses of human programmers and the need for a multifaceted solution for compliance requirements.

Research limitations/implications

This study notes the novelty of RegTech in the financial world, especially in the Islamic financial market. Thus, there is a dearth of relevant literature. This study assists relevant conventional and Islamic financial market entities and authorities in determining the potential impact of RegTech on their respective businesses and the financial system.

Practical implications

This study proffers recommendations to assist in addressing the challenges facing its users and paving the way for innovative solutions that will facilitate and enhance the use of RegTech in financial markets. Regulators and other stakeholders of the financial industry will learn from the challenges identified and can review the recommendations for adoption. Apart from that, the decision of B2C2 Ltd v Quoine has practical implications for RegTech users, as the court in B2C2 Ltd v Quoine accessed the “knowledge” of the programmers of deterministic software at the time of the coding.

Originality/value

RegTech can offer cost-effective and efficient means to comply with regulations and ensure the accuracy of the information provided to regulators. This study provides a better understanding of the challenges associated with its use. The recommendations include enactment of a blueprint for a digitally enabled regulatory framework, creating awareness of RegTech via stakeholder roundtable discussions, development of human talent, formulating human governance standards and finding innovative ways to manage risks.

Details

Journal of Islamic Accounting and Business Research, vol. 15 no. 5
Type: Research Article
ISSN: 1759-0817

Keywords

1 – 10 of 682