Search results

1 – 10 of 55
Open Access
Article
Publication date: 31 July 2020

Ado Adamou Abba Ari, Olga Kengni Ngangmo, Chafiq Titouna, Ousmane Thiare, Kolyang, Alidou Mohamadou and Abdelhak Mourad Gueroui

The Cloud of Things (IoT) that refers to the integration of the Cloud Computing (CC) and the Internet of Things (IoT), has dramatically changed the way treatments are done in the…

6377

Abstract

The Cloud of Things (IoT) that refers to the integration of the Cloud Computing (CC) and the Internet of Things (IoT), has dramatically changed the way treatments are done in the ubiquitous computing world. This integration has become imperative because the important amount of data generated by IoT devices needs the CC as a storage and processing infrastructure. Unfortunately, security issues in CoT remain more critical since users and IoT devices continue to share computing as well as networking resources remotely. Moreover, preserving data privacy in such an environment is also a critical concern. Therefore, the CoT is continuously growing up security and privacy issues. This paper focused on security and privacy considerations by analyzing some potential challenges and risks that need to be resolved. To achieve that, the CoT architecture and existing applications have been investigated. Furthermore, a number of security as well as privacy concerns and issues as well as open challenges, are discussed in this work.

Details

Applied Computing and Informatics, vol. 20 no. 1/2
Type: Research Article
ISSN: 2634-1964

Keywords

Article
Publication date: 17 April 2024

Rafiu King Raji, Jian Lin Han, Zixing Li and Lihua Gong

At the moment, in terms of both research and commercial products, smart shoe technology and applications seem not to attract the same magnitude of attention compared to smart…

Abstract

Purpose

At the moment, in terms of both research and commercial products, smart shoe technology and applications seem not to attract the same magnitude of attention compared to smart garments and other smart wearables such as wrist watches and wrist bands. The purpose of this study is to fill this knowledge gap by discussing issues regarding smart shoe sensing technologies, smart shoe sensor placements, factors that affect sensor placements and finally the areas of smart shoe applications.

Design/methodology/approach

Through a review of relevant literature, this study first and foremost attempts to explain what constitutes a smart shoe and subsequently discusses the current trends in smart shoe applications. Discussed in this study are relevant sensing technologies, sensor placement and areas of smart shoe applications.

Findings

This study outlined 13 important areas of smart shoe applications. It also uncovered that majority of smart shoe functionality are physical activity tracking, health rehabilitation and ambulation assistance for the blind. Also highlighted in this review are some of the bottlenecks of smart shoe development.

Originality/value

To the best of the authors’ knowledge, this is the first comprehensive review paper focused on smart shoe applications, and therefore serves as an apt reference for researchers within the field of smart footwear.

Details

Sensor Review, vol. 44 no. 3
Type: Research Article
ISSN: 0260-2288

Keywords

Open Access
Article
Publication date: 27 April 2020

Laura Sheerman, Hannah R. Marston, Charles Musselwhite and Deborah Morgan

Technologies are ubiquitous in modern Britain, gradually infiltrating many areas of our working and personal lives. But what role can technology play in the current COVID-19…

Abstract

Technologies are ubiquitous in modern Britain, gradually infiltrating many areas of our working and personal lives. But what role can technology play in the current COVID-19 pandemic? At a time when our usual face to face social interactions are temporarily suspended, many of us have reached out to technology (e.g. Skype, WhatsApp, Facebook, Zoom) to help maintain a sense of closeness and connection to friends, family and vital services.

One largely unsung technology is the virtual assistant (VA), a cost-efficient technology enabling users to access the Internet of Things using little more than voice. Deploying an ecological framework, in the context of smart age-friendly cities, this paper explores how VA technology can function as an emergency response system, providing citizens with systems to connect with friends, family, vital services and offering assistance in the diagnosis of COVID-19.

We provide an illustration of the potentials and challenges VAs present, concluding stricter regulation and controls should be implemented before VAs can be safely integrated into smart age-friendly cities across the globe.

Details

Emerald Open Research, vol. 1 no. 2
Type: Research Article
ISSN: 2631-3952

Keywords

Content available
Book part
Publication date: 1 December 2023

Gail Anne Mountain

Abstract

Details

Occupational Therapy With Older People into the Twenty-First Century
Type: Book
ISBN: 978-1-83753-043-4

Article
Publication date: 8 November 2023

Miriam Alzate, Marta Arce Urriza and Monica Cortiñas

This study aims to understand the extent of privacy concerns regarding voice-activated personal assistants (VAPAs) on Twitter. It investigates three key areas: (1) the effect of…

Abstract

Purpose

This study aims to understand the extent of privacy concerns regarding voice-activated personal assistants (VAPAs) on Twitter. It investigates three key areas: (1) the effect of privacy-related press coverage on public sentiment and discussion volume; (2) the comparative negativity of privacy-focused conversations versus general conversations; and (3) the specific privacy-related topics that arise most frequently and their impact on sentiment and discussion volume.

Design/methodology/approach

A dataset of 441,427 tweets mentioning Amazon Alexa, Google Assistant, and Apple Siri from July 1, 2019 to June 30, 2021 were collected. Privacy-related press coverage has also been monitored. Sentiment analysis was conducted using the dictionary-based software LIWC and VADER, whereas text mining packages in R were used to identify privacy-related issues.

Findings

Negative privacy-related news significantly increases both negativity and volume in Twitter conversations, whereas positive news only boosts volume. Privacy-related tweets were notably more negative than general tweets. Specific keywords were found to either increase or decrease the sentiment and discussion volume. Additionally, a temporal evolution in sentiment, with general attitudes toward VAPAs becoming more positive, but privacy-specific discussions becoming more negative was observed.

Originality/value

This research augments the existing online privacy literature by employing text mining methodologies to gauge consumer sentiments regarding privacy concerns linked to VAPAs, a topic currently underexplored. Furthermore, this research uniquely integrates established theories from privacy calculus and social contract theory to deepen our analysis.

Details

Journal of Research in Interactive Marketing, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2040-7122

Keywords

Article
Publication date: 26 July 2023

Yupeng Mou and Xiangxue Meng

With the upgrade of natural language interaction technology, the simulation extension of intelligent voice assistants (IVAs) and the uncertainty of products and services have…

Abstract

Purpose

With the upgrade of natural language interaction technology, the simulation extension of intelligent voice assistants (IVAs) and the uncertainty of products and services have received more and more attention. However, most of the existing research focuses on investigating the application of theories to explain consumer behavior related to intention to use and adopt IVAs, while ignoring the impact of its privacy issues on consumer resistance. This article especially examines the negative impact of artificial intelligence-based IVAs’ privacy concerns on consumer resistance, and studies the mediating effect of perceived creepiness in the context of privacy cynicism and privacy paradox and the moderating effect of anthropomorphized roles of IVAs and perceived corporate social responsibility (CSR) of IVAs’ companies. The demographic variables are also included.

Design/methodology/approach

Based on the theory of human–computer interaction (HCI), this study addresses the consumer privacy concerns of IVAs, builds a model of the influence mechanism on consumer resistance, and then verifies the mediating effect of perceived creepiness and the moderating effect of anthropomorphized roles of IVAs and perceived CSR of IVAs companies. This research explores underlying mechanism with three experiments.

Findings

It turns out that consumers’ privacy concerns are related to their resistance to IVAs through perceived creepiness. The servant (vs. partner) anthropomorphized role of IVAs is likely to induce more privacy concerns and in turn higher resistance. At the same time, when the company’s CSR is perceived high, the impact of the concerns of IVAs’ privacy issues on consumer resistance will be weakened, and the intermediary mechanism of perceiving creepiness in HCI and anthropomorphism of new technology are further explained and verified. The differences between different age and gender are also revealed in the study.

Originality/value

The research conclusions have strategic reference significance for enterprises to build the design framework of IVAs and formulate the response strategy of IVAs’ privacy concerns. And it offers implications for researchers and closes the research gap of IVAs from the perspective of innovation resistance.

Article
Publication date: 27 February 2024

Shefali Arora, Ruchi Mittal, Avinash K. Shrivastava and Shivani Bali

Deep learning (DL) is on the rise because it can make predictions and judgments based on data that is unseen. Blockchain technologies are being combined with DL frameworks in…

Abstract

Purpose

Deep learning (DL) is on the rise because it can make predictions and judgments based on data that is unseen. Blockchain technologies are being combined with DL frameworks in various industries to provide a safe and effective infrastructure. The review comprises literature that lists the most recent techniques used in the aforementioned application sectors. We examine the current research trends across several fields and evaluate the literature in terms of its advantages and disadvantages.

Design/methodology/approach

The integration of blockchain and DL has been explored in several application domains for the past five years (2018–2023). Our research is guided by five research questions, and based on these questions, we concentrate on key application domains such as the usage of Internet of Things (IoT) in several applications, healthcare and cryptocurrency price prediction. We have analyzed the main challenges and possibilities concerning blockchain technologies. We have discussed the methodologies used in the pertinent publications in these areas and contrasted the research trends during the previous five years. Additionally, we provide a comparison of the widely used blockchain frameworks that are used to create blockchain-based DL frameworks.

Findings

By responding to five research objectives, the study highlights and assesses the effectiveness of already published works using blockchain and DL. Our findings indicate that IoT applications, such as their use in smart cities and cars, healthcare and cryptocurrency, are the key areas of research. The primary focus of current research is the enhancement of existing systems, with data analysis, storage and sharing via decentralized systems being the main motivation for this integration. Amongst the various frameworks employed, Ethereum and Hyperledger are popular among researchers in the domain of IoT and healthcare, whereas Bitcoin is popular for research on cryptocurrency.

Originality/value

There is a lack of literature that summarizes the state-of-the-art methods incorporating blockchain and DL in popular domains such as healthcare, IoT and cryptocurrency price prediction. We analyze the existing research done in the past five years (2018–2023) to review the issues and emerging trends.

Details

International Journal of Quality & Reliability Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0265-671X

Keywords

Article
Publication date: 28 February 2023

Zhisheng Chen

This study aims to explore the application scenarios of metaverse offices in organizations, including immersive work experiences, weak social networks and virtual meetings. Based…

Abstract

Purpose

This study aims to explore the application scenarios of metaverse offices in organizations, including immersive work experiences, weak social networks and virtual meetings. Based on the exploration of this application scenario, this study discusses four levels of organizational change that will be brought about by the future metaverse office, such as the inter-enterprise ecological collaboration model, distributed autonomous organization, flexible leadership and individual belongingness. The metaverse office has some special advantages over traditional office models, but the metaverse office still raises some issues, such as privacy, security, addiction, equity and usability. These issues brake the widespread adoption of metaverse technologies. The study recommends that researchers take these issues into account in future metaverse research and development.

Design/methodology/approach

This study surveys the relevant literature by means of a literature review in order to analyze how metaverse technology can be applied to teleworking. Two databases including Web of Science (https://www.webofscience.com/) and Google Scholar (http://scholar.google.com) were selected for this study. Keywords such as “teleworking and metaverse” were used, and 18 publications were found to be relevant to the study. After excluding duplicates, less relevant and older literature, only 14 articles could be used as references for this study. Based on the exploration of this application scenario, this study discusses four levels of organizational change and issues that will be brought about by the metaverse office of the future.

Findings

It presents the application scenarios of the metaverse office in organizations, including immersive work experience, weak social networking and virtual meetings.

Social implications

The pandemic triggers a desire for contactless working. The three main applications of the metaverse office also have a practical value which has been proven in some high-tech companies. It is foreseeable that an efficient, electronic and personalized office model will be enthusiastically adopted by society. Metaverse office will gradually step into people's view in the future.

Originality/value

The concept of the metaverse office has rarely been touched upon by theoretical research, although the technology is gradually becoming known. Even its application to teleworking has only recently been reached by some organizations.

Details

Kybernetes, vol. 53 no. 6
Type: Research Article
ISSN: 0368-492X

Keywords

Article
Publication date: 13 November 2023

Tareq Na’el Al-Tawil and Salam Abdallah

The purpose of this paper is to examine the nature of cyberbullying and corresponding strategies being used under the New United Arab Emirates (UAE) Cybercrimes Law.

Abstract

Purpose

The purpose of this paper is to examine the nature of cyberbullying and corresponding strategies being used under the New United Arab Emirates (UAE) Cybercrimes Law.

Design/methodology/approach

The analysis begins with a review of the nature of cyberbullying, focusing primarily on key concepts, underlying risk factors, forms of cyberbullying and adverse effects. Background information about the nature of cyberbullying will then lay the foundation for the subsequent sections of the analysis, which will focus on preventive strategies and legislative measures. The second section of the analysis will entail a review of the legislative framework for cyberbullying in the UAE. The goal here is to examine how the UAE is responding to the emerging threat of cyberbullying in its jurisdiction. The next section will then shift gears to interventions and strategies being implemented at the global level. A global perspective is central to comparing practices in the UAE to international standards and regulations.

Findings

Findings from the analysis have shown that the UAE has the most robust and comprehensive cyberbullying laws internationally. Nonetheless, the New Cybercrimes Law is ambiguous, and it is not expressively specific to cyberbullying. The law does not have a clear definition of cyberbullying, as well as the scope of its application to specific cases involving students. A comparative analysis across jurisdictions has revealed that most countries neither have specific cyberbullying laws nor explicitly define the phenomenon in existing laws. Thus, cyberbullying is a gray area in the UAE national law, requiring a clear definition and scope of application. The courts will establish case law that will finally address the current definitional challenges and extend of applying the New Cybercrimes Law.

Originality/value

The analysis concludes with the application of international best standards and practices to the UAE context, focusing specifically on how to strengthen laws and procedures in the UAE.

Details

Journal of Financial Crime, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1359-0790

Keywords

Article
Publication date: 5 January 2023

George Yui-Lam Wong, Ron Chi-Wai Kwok, Shanshan Zhang, Gabriel Chun-Hei Lai, Yanyan Li and Jessica Choi-Fung Cheung

This study aims to examine the impact of information communication technology-enabled work during non-working hours (ICT-enabled WNWHs), as a source of stress, on employee…

Abstract

Purpose

This study aims to examine the impact of information communication technology-enabled work during non-working hours (ICT-enabled WNWHs), as a source of stress, on employee behavioral outcomes –in-role job performance, organizational citizenship behaviors (OCBs) that benefit organizations and OCBs that benefit individuals, through emotional responses – work exhaustion, nonwork exhaustion and organization-based self-esteem. As the coronavirus disease 2019 (COVID-19) lockdowns demonstrated that employees frequently engage in ICT-enabled WNWHs, studying stress induced by ICT-enabled WNWHs is essential for understanding employee adaptation to the work-from-home trend that emerged from COVID-19 lockdowns.

Design/methodology/approach

A quantitative survey comprising 1,178 employees in China was conducted, and the data reliability and validity were confirmed. Partial least squares structural equation modeling analysis was employed to test the hypotheses.

Findings

The study results empirically proved that, although ICT-enabled WNWHs had significant effects on employee behavioral outcomes, the related emotional responses were the mediators of the stress transmission mechanism that directly affected employee behavioral outcomes. Notably, work exhaustion and organization-based self-esteem partially mediate the stress transmission mechanism, while nonwork exhaustion exerts a full mediating effect.

Originality/value

This study proposes the stress transmission mechanism of ICT-enabled WNWHs and delineates emotional responses regarding the work environment attributes of ICT-enabled WNWHs, an approach rarely seen in prior IS studies. To our best knowledge, this study is the first to identify and empirically demonstrate organization-based self-esteem as one among the emotional responses to ICT-enabled WNWHs. Furthermore, it expands understanding of the holistic impacts of ICT-enabled WNWHs, which is lacking in information systems (IS) literature.

1 – 10 of 55