Search results

1 – 10 of 11
Article
Publication date: 9 January 2017

Xiaomi An, Wenlin Bai, Hepu Deng, Shuyang Sun, Wenrui Zhong and Yu Dong

The purpose of this paper is to explore the relationship between different mechanisms for integrating national archival resources, leading to the development of a knowledge…

3185

Abstract

Purpose

The purpose of this paper is to explore the relationship between different mechanisms for integrating national archival resources, leading to the development of a knowledge management-based framework for facilitating the optimal utilization of national archives resources in China.

Design/methodology/approach

The study adopts a mixed-methods approach consisting of a review of existing mechanisms for integrating national archival resources and site visits and interviews for investigating the effectiveness of these mechanisms in real world practices for managing and utilizing national archives resources in China.

Findings

The knowledge management-based framework is shown to be useful for building interdependence, interconnections and interactions between diversified integration mechanisms to meet national, societal and public needs in China. The framework is significant for rearranging the role of knowledge management in collaboration to protect the value of national archives resources as the knowledge asset of a state. It can reengineer the knowledge management activities in communication to share the value of national archives resources as the knowledge asset of a society. Furthermore, the framework can reconfigure knowledge management artifacts in connectivity to increase the value of national archives resources as the knowledge asset of the public.

Research limitations/implications

The review of the related literature is selective rather than comprehensive, and the interviews are based on a self-selected convenience sample, which is rather skewed demographically.

Practical implications

The proposed framework can be used to guide the development of a national strategy for the effective integration of national archives resources to promote a better delivery of public-centric knowledge services in a specific society.

Originality/value

This study provides a knowledge management framework for the effective integration of national archives resources toward their optimal utilization. It contributes to the examination of the role of different integration mechanisms in interactive knowledge management processes and the advancement of academic debate on the effectiveness of these mechanisms for the integration of national archives resources to facilitate their optimal utilization in China.

Details

Journal of Documentation, vol. 73 no. 1
Type: Research Article
ISSN: 0022-0418

Keywords

Article
Publication date: 2 November 2015

Xiaomi An, Wenlin Bai, Hepu Deng, Shuyang Sun, Yu Dong, Wenrui Zhong and Jufang Hu

This paper aims to develop a comprehensive concept map to guide adequate protection and effective management of personal information in the provision of networked services in…

Abstract

Purpose

This paper aims to develop a comprehensive concept map to guide adequate protection and effective management of personal information in the provision of networked services in China through comprehensively considering the multi-disciplinary perspective of personal information protection and management with respect to their multi-dimensional applications, multi-directional controls and multi-contextual analysis in today’s networked environments. There are different perspectives on what personal information protection and management is about, why and how personal information should be protected and managed in the literature. Little, however, is known about the relationships between these multiple perspectives and their implications to personal information protection and management in the real-world practice.

Design/methodology/approach

A multi-methods approach is adopted in the study, including a comprehensive review of the related literature, a content analysis of the relevant laws, polices, standards, a multi-cases study of the relevant network services providers and an online survey of the Chinese citizens who are the end-users of the networked services to adequately achieve the objective of this study. The concept map building technique is used as a tool for conducting the meta-synthesis of the findings from multiple data resources in the development of a comprehensive concept map for personal information protection and management.

Findings

This study rationalizes the importance of the identification of personal information for adequate protection and effective management. It identifies five perspectives on personal information protection and management, namely, law, economics, sociology, information technology and information resources management for their applications at the organizational level. Five types of personal information are identified in the study for protection and management, namely, identifiable personal information, personal identity information, personal moral right information, personal civil right and interest information and personal business and transaction information. An integrated approach consisting of risk control, security control and users control is proposed for personal information protection and management in the provision of networked services in China. The study shows that not enough attention has been paid to the personal information protection and management from multi-disciplinary perspectives with respect to their multi-dimensional applications, multi-directional controls and multi-contextual analysis in the literature. There is a lack of understanding of what, why and how personal information is protected and managed in real-world practices in China.

Practical implications

The investigation of the issues of personal information protection and management with respect to the relevant laws, polices, standards, networked services and organizations can lead to a better understanding of what, why and how personal information is protected and managed in real-world practices in China. The development of a comprehensive concept map for personal information protection and management can be used as an effective guideline for the formulation and implementation of appropriate strategies and policies in individual organizations for providing their stakeholders with quality-networked services in today’s highly connected network environment in China.

Originality/value

The paper is the first step of a comprehensive study on the protection and management of personal information for the provision of networked services in China. It provides a solid foundation for further research with respect to the personal information protection and management. It is the first of this kind of studies to answer the questions of what types of personal information needed to be protected, why and how they should be protected in conformity with laws, regulations, polices, standards and the needs of networked services and business activities of organizations.

Details

The Electronic Library, vol. 33 no. 6
Type: Research Article
ISSN: 0264-0473

Keywords

Content available
Article
Publication date: 1 August 2006

88

Abstract

Details

Disaster Prevention and Management: An International Journal, vol. 15 no. 4
Type: Research Article
ISSN: 0965-3562

Article
Publication date: 1 March 2022

Shuyang Li, Jorge Tiago Martins, Ana Cristina Vasconcelos and Guochao Peng

This study aims to illuminate the currently poorly understood inflow of knowledge originating from project managers across the value chain of construction projects. The primary…

Abstract

Purpose

This study aims to illuminate the currently poorly understood inflow of knowledge originating from project managers across the value chain of construction projects. The primary purpose is to identify the domains of knowledge that project managers’ need to share in their management activities, the skills they need to develop in their sharing practices and how these relate to each other across different phases of a construction project.

Design/methodology/approach

Knowledge domains, skills and the relationships between them were identified following an inductive methodology, a combination of grounded theory and case study, and through the analysis of semi-structured interviews with 21 project managers and participants within a single construction project.

Findings

The outcome is a novel framework that theorizes the dynamic interplay between knowledge domains and the skills that facilitate knowledge sharing (KS) for successful project work throughout the construction project.

Originality/value

The combined effects of task heterogeneity, knowledge interdependencies and temporariness require paying increased attention to how knowledge domains and KS skills impact project performance. This paper addresses gaps in developing an integrative understanding of the nature of the domains of knowledge that need to be shared in a project context, the key skills contributing to KS and more importantly, how they evolve and are interpreted and reinterpreted throughout the project and assist KS practice in projects.

Details

Journal of Knowledge Management, vol. 27 no. 2
Type: Research Article
ISSN: 1367-3270

Keywords

Article
Publication date: 14 July 2020

Yang Wang, Misheng Lin, Ke Xu, Shuyang Zhang and Hongwei Ma

Electrochromic window (ECW) has been gradually applied to building engineering in recent years. However, empirical study of this technology used in green building design is still…

Abstract

Purpose

Electrochromic window (ECW) has been gradually applied to building engineering in recent years. However, empirical study of this technology used in green building design is still lacking. This study aims to verify the lighting and energy-saving performance of ECW under a specific geographical environment.

Design/methodology/approach

The meditation pavilion of Jinwan new materials research institute in Zhuhai is taken for research object. Three kinds of sun-shading techniques, namely, ECW, Low-E window and ordinary glass window, with same specifications are selected as the building facade structure for simulation. Day lighting analysis, sun-shading performance and annual energy consumption are separately simulated in the same environment by the Autodesk Ecotect Analysis software. The energy-saving performance of ECW is obtained by comparisons.

Findings

Result shows that the shading performance of ECW is much better than ordinary window and Low-E window. When ECW is used in the east, west or top lighting interfaces of a building, about 40% of the total solar radiation can be reduced during daytime in summer. Taking the ordinary glass window as a basic reference, ECW can save about 90% of the annual energy consumption of the glass house. ECW can effectively reduce the annual refrigeration energy consumption of buildings in the subtropical region.

Practical implications

Reasonable use of ECW in the subtropical region can effectively reduce the annual energy consumption of buildings.

Originality/value

It is a precedent study to analyze the lighting performance and energy consumption of a glass house with ECW. The energy-saving characteristics and beautiful appearance of ECW shall make it a future green building technology.

Details

Journal of Engineering, Design and Technology , vol. 19 no. 1
Type: Research Article
ISSN: 1726-0531

Keywords

Article
Publication date: 7 June 2019

Shuyang Li, Guo Chao Peng and Fei Xing

Big data is a key component to realise the vision of smart factories, but the implementation and usage of big data analytical tools in the smart factory context can be fraught…

1255

Abstract

Purpose

Big data is a key component to realise the vision of smart factories, but the implementation and usage of big data analytical tools in the smart factory context can be fraught with challenges and difficulties. The purpose of this paper is to identify potential barriers that hinder organisations from applying big data solutions in their smart factory initiatives, as well as to explore causal relationships between these barriers.

Design/methodology/approach

The study followed an inductive and exploratory nature. Ten in-depth semi-structured interviews were conducted with a group of highly experienced SAP consultants and project managers. The qualitative data collected were then systematically analysed by using a thematic analysis approach.

Findings

A comprehensive set of barriers affecting the implementation of big data solutions in smart factories had been identified and divided into individual, organisational and technological categories. An empirical framework was also developed to highlight the emerged inter-relationships between these barriers.

Originality/value

This study built on and extended existing knowledge and theories on smart factory, big data and information systems research. Its findings can also raise awareness of business managers regarding the complexity and difficulties for embedding big data tools in smart factories, and so assist them in strategic planning and decision making.

Details

Industrial Management & Data Systems, vol. 119 no. 5
Type: Research Article
ISSN: 0263-5577

Keywords

Article
Publication date: 18 April 2022

Shuyang Li, Shu Jiang, Miao Tian, Yun Su and Jun Li

The purpose of this paper is to gain an in-depth understanding of the research progress, hotspots and future trends in the field of functional clothing.

Abstract

Purpose

The purpose of this paper is to gain an in-depth understanding of the research progress, hotspots and future trends in the field of functional clothing.

Design/methodology/approach

The records of 4,153 pieces of literature related to functional clothing were retrieved from Web of Science by using a comprehensive retrieval strategy. A piece of software, CiteSpace was used as a tool to visualize the results of specific terms, such as author, institution and keyword. By analyzing the knowledge maps with several indicators, the intellectual basis and research fronts for the functional clothing domain could then be demonstrated.

Findings

The result indicated that functional clothing was a popular research field, with approximately 500 papers published worldwide in 2020. Its main research area was material science and involved public environmental and occupational health, engineering, etc. showing the characteristic of multi-interdisciplinary. Textile Research Journal and International Journal of Clothing Science and Technology were the top two journals in this field. The USA, China, Australia, England and Germany have been active and frequently cooperating with each other. Donghua University, the Hong Kong Polytechnic University and NASA, with the largest number of publications, were identified as the main research drivers. According to the co-citation analysis, thermal stress, nanogenerator and electrospinning were the topics of most cited articles during the past 20 years.

Practical implications

The findings identified smart clothing and protective clothing to be the research frontiers in the field of functional clothing, which deserved further study in the future.

Originality/value

The outcomes offered an overview of the research status and future trends of the functional clothing field. It could not only provide scholars with convenience in identifying research hotspots and building potential cooperation in the follow-up research, but also assist beginners in searching core scholars and literature of great significance.

Details

International Journal of Clothing Science and Technology, vol. 34 no. 5
Type: Research Article
ISSN: 0955-6222

Keywords

Article
Publication date: 14 November 2016

Rong Wang, Wenlin Liu and Shuyang Gao

The purpose of this paper is to conceptualize the use of Twitter hashtag as a strategy to enhance the visibility and symbolic power of social movement-related information. It…

5945

Abstract

Purpose

The purpose of this paper is to conceptualize the use of Twitter hashtag as a strategy to enhance the visibility and symbolic power of social movement-related information. It examined how characteristics of hashtag drove information virality during a networked social movement.

Design/methodology/approach

Twitter data from two days during the Occupy Wall Street Movement in 2011 were collected. With network analysis, the authors identified popular hashtag types and examined hashtag co-occurrence patterns during the two contrasting movement days. It also provides a comparative analysis of how major types of viral hashtag may play different roles depending on different movement cycles.

Findings

The authors found that the role of hashtag influencing information virality may vary based on the context of the tweets. For example, movement participants applied more strategic hashtag combinations during the unexpected event day to reach different social circles. Consistent patterns were identified in mobilizing influential actors such as public figures. Different use patterns of media outlet hashtag were found across the two days.

Originality/value

Implications on how hashtag type and event dynamics may shape hashtag co-occurrence patterns were discussed.

Details

Online Information Review, vol. 40 no. 7
Type: Research Article
ISSN: 1468-4527

Keywords

Article
Publication date: 1 August 2019

Ziaul Haque Choudhury and M. Munir Ahamed Rabbani

Nowadays, the use of forged e-passport is increasing, which is threatening national security. It is important to improve the national security against international crime or…

Abstract

Purpose

Nowadays, the use of forged e-passport is increasing, which is threatening national security. It is important to improve the national security against international crime or terrorism. There is a weak verification process caused by lack of identification processes such as a physical check, biometric check and electronic check. The e-passport can prevent the passport cloning or forging resulting from the illegal immigration. The paper aims to discuss these issues.

Design/methodology/approach

This paper focuses on face recognition to improve the biometric authentication for an e-passport, and it also introduces facial permanent mark detection from the makeup or cosmetic-applied faces, twins and similar faces. An algorithm is proposed to detect the cosmetic-applied facial permanent marks such as mole, freckle, birthmark and pockmark. Active Shape Model into Active Appearance Model using Principal Component Analysis is applied to detect the facial landmarks. Facial permanent marks are detected by applying the Canny edge detector and Gradient Field Histogram of Oriented Gradient.

Findings

This paper demonstrated an algorithm and proposed facial marks detection from cosmetic or makeup-applied faces for a secure biometric passport in the field of personal identification for national security. It also presented to detect and identify identical twins and similar faces. This paper presented facial marks detection from the cosmetic-applied face, which can be mixed with traditional methods. However, the use of the proposed technique faced some challenges due to the use of cosmetic. The combinations of the algorithm for facial mark recognition matching with classical methods were able to attain lower errors in this proposed experiment.

Originality/value

The proposed method will enhance the national security and it will improve the biometric authentication for the e-passport. The proposed algorithm is capable of identifying facial marks from cosmetic-applied faces accurately, with less false positives. The proposed technique shows the best results.

Details

International Journal of Intelligent Unmanned Systems, vol. 8 no. 1
Type: Research Article
ISSN: 2049-6427

Keywords

Article
Publication date: 9 May 2023

Yiming Li, Hongzhuan Chen, Shuo Cheng and Abdul Waheed Siyal

In order to analyze the level of independent controllability and its evolution of high-end equipment manufacturing industry from Jiangsu Province, this article introduces the…

Abstract

Purpose

In order to analyze the level of independent controllability and its evolution of high-end equipment manufacturing industry from Jiangsu Province, this article introduces the dual-excitation control line method to construct a comprehensive evaluation model for independent controllability.

Design/methodology/approach

Through the collection of information of high-end equipment manufacturing industry's independent and controllable capabilities on different indicators, the three aspects of advancement, autonomy and controllability, an empirical evaluation of 10 enterprises in the high-end equipment cluster in Jiangsu Province was conducted in terms of advancement, autonomy and controllability.

Findings

It effectively reveals the area and evolution characteristics of the “reward” and “punishment” of different indicators of each representative enterprise and reflects the development status and different characteristics of each representative enterprise on the three indicators. The research results provide decision-making guidance for enterprises in the management and control of advanced manufacturing systems with independent and controllable capabilities.

Originality/value

Existing research focuses on the evaluation of enterprises' independent controllability only on a single angle or index. This paper maps the dynamic evaluation problem of multiple time-point data to the evaluation problem of single time-point multi-index data and investigates the fluctuation of the performance of the same enterprise under different indexes, so as to comprehensively evaluate the independent controllable level of high-end equipment manufacturing industry and analyze the reasons. Further, this paper first establishes an evaluation index system of independent controllable level of high-end equipment manufacturing industry and quantitatively measures the advanced, independent, controllable and other aspects of typical enterprises in this industry by constructing a double incentive control line evaluation model.

Details

Kybernetes, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0368-492X

Keywords

1 – 10 of 11