Search results

1 – 10 of 151
Open Access
Article
Publication date: 18 July 2023

Shinta Rahma Diana and Farida Farida

Technology acceptance is a measure of that technology’s usefulness. Oil palm is one of the biggest contributors to Indonesia’s revenues, thus fueling its economy. Using remote…

Abstract

Purpose

Technology acceptance is a measure of that technology’s usefulness. Oil palm is one of the biggest contributors to Indonesia’s revenues, thus fueling its economy. Using remote sensing would allow a plantation to monitor and forecast its production and the amount of fertilizer used. This review aims to provide a policy recommendation in the form of a strategy to improve the added value of Indonesia’s oil palm and support the government in increasing oil palm production. This recommendation needs to be formulated by determining the users’ acceptance of remote sensing technology (state-owned plantations, private plantation companies and smallholder plantations).

Design/methodology/approach

This review’s methodology used sentiment analysis through text mining (bag of words model). The study’s primary data were from focus group discussions (FGDs), questionnaires, observations on participants, audio-visual documentation and focused discussions based on group category. The results of interviews and FGDs were transcribed into text and analyzed to 1) find words that can represent the content of the document; 2) classify and determine the frequency (word cloud); and finally 3) analyze the sentiment.

Findings

The result showed that private plantation companies and state-owned plantations had extremely high positive sentiments toward using remote sensing in their oil palm plantations, whereas smallholders had a 60% resistance. However, there is still a possibility for this technology’s adoption by smallholders, provided it is free and easily applied.

Research limitations/implications

Basically, technology is applied to make work easier. However, not everyone is tech-savvy, especially the older generations. One dimension of technology acceptance is user/customer retention. New technology would not be immediately accepted, but there would be user perceptions about its uses and ease. At first, people might be reluctant to accept a new technology due to the perception that it is useless and difficult. Technology acceptance is the gauge of how useful technology is in making work easier compared to conventional ways.

Practical implications

Therefore, technology acceptance needs to be improved among smallholders by intensively socializing the policies, and through dissemination and dedication by academics and the government.

Social implications

The social implications of using technology are reducing the workforce, but the company will be more profitable and efficient.

Originality/value

Remote sensing is one of the topics that people have not taken up in a large way, especially sentiment analysis. Acceptance of technology that utilizes remote sensing for plantations is very useful and efficient. In the end, company profits can be allocated more toward empowering the community and the environment.

Details

Arab Gulf Journal of Scientific Research, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1985-9899

Keywords

Article
Publication date: 25 October 2022

Kenneth Cosh, Sakgasit Ramingwong and Lachana Ramingwong

This paper aims to identify and understand changing research themes within this field and apply a novel technique for text mining.

Abstract

Purpose

This paper aims to identify and understand changing research themes within this field and apply a novel technique for text mining.

Design/methodology/approach

Statistical text mining methods are applied as an approach to bibliographic analysis to nearly 30 years of papers published in Library Review and Global Knowledge, Memory and Communication to identify key research themes and analyse how they have evolved over this period.

Findings

Key stable research themes include students, literacy, learning, research, while emerging research themes include social media, networking and knowledge sharing through information and communication technology.

Originality/value

A novel approach to bibliometric analysis is applied to a large collection of texts published in the library field.

Details

Global Knowledge, Memory and Communication, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2514-9342

Keywords

Article
Publication date: 16 February 2024

Neil Alperstein

The purpose of this study was to examine consumer data acquired by branded prescription drug websites and the ethics of privacy related to the interconnected web of personal…

Abstract

Purpose

The purpose of this study was to examine consumer data acquired by branded prescription drug websites and the ethics of privacy related to the interconnected web of personal information accessed, packaged and resold by tracker technologies.

Design/methodology/approach

The research used the DMI Tracker Tool to collect data on the top 17 branded prescription drug websites, with a specific interest in the tracker technologies embedded in those websites. That data was analyzed using Gephi, an open-source data visualization tool, to map the network of trackers embedded in those branded prescription drug websites.

Findings

Findings visualize the interconnections between tracker technologies and prescription drug websites that undergird a system of personal data acquisition and programmatic advertising vehicles that serve the interests of prescription drug marketers and Big Tech. Based on the theory of platform ethics, the study demonstrated the presence of a technostructural ecosystem dominated by Big Tech, a system that goes unseen by consumers and serves the interests of advertisers and resellers of consumer data.

Research limitations/implications

The 17 websites used in this study were limited to the top-selling prescription drugs or those with the highest ad expenditures. As such this study is not based on a random sampling of branded prescription drug websites. The popularity of these prescription drugs or the expanse of advertising associated with the drugs makes them appropriate to study the presence of tracking devices that collect data from consumers and serve advertising to them. It is also noted that websites are dynamic spaces, and some trackers within their infrastructures are apt to change over time.

Practical implications

Branded prescription drug information has over the past three decades become part of consumers’ routine search for information regarding what ails them. As drug promotion moved from print to TV and the Web, searching for drug information has become a part of everyday life. The implications of embedded trackers on branded prescription drug websites are the subject of this research.

Social implications

This study has significant social implications as consumers who are searching for information regarding prescription medications may not want drug companies tracking them in a way that many perceive to be an invasion of privacy. Yet, as the Web is dominated by Big Tech, web developers have little choice but to remain a part of this technostructural ecosystem.

Originality/value

This study sheds light on branded prescription drug websites, exploring the imbalance between the websites under study, Big Tech and consumers who lack awareness of the system that operates backstage.

Details

International Journal of Pharmaceutical and Healthcare Marketing, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1750-6123

Keywords

Open Access
Article
Publication date: 25 March 2024

Paolo Biancone, Valerio Brescia, Federico Chmet and Federico Lanzalonga

The research aims to provide a longitudinal case study to understand how digital transformation can be embedded in municipal reporting frameworks. The central role of such…

Abstract

Purpose

The research aims to provide a longitudinal case study to understand how digital transformation can be embedded in municipal reporting frameworks. The central role of such technology becomes increasingly evident as citizens demand greater transparency and engagement between them and governing institutions.

Design/methodology/approach

Utilising a longitudinal case study methodology, the research focusses on Turin’s Integrated Popular Financial Report (IPFR) as a lens through which to evaluate the broader implications of digital transformation on governmental transparency and operational efficiency.

Findings

Digital tools, notably sentiment analysis, offer promising avenues for enhancing governmental efficacy and citizenry participation. However, persistent challenges highlight the inadequacy of traditional, inflexible reporting structures to cater to dynamic informational demands.

Practical implications

Embracing digital tools is an imperative for contemporary public administrators, promoting streamlined communication and dismantling bureaucratic obstructions, all while catering to the evolving demands of an informed citizenry.

Originality/value

Different from previous studies that primarily emphasised technology’s role within budgeting, this research uniquely positions itself by spotlighting the transformative implications of digital tools during the reporting phase. It champions the profound value of fostering bottom-up dialogues, heralding a paradigmatic shift towards co-creative public management dynamics.

Details

EuroMed Journal of Business, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1450-2194

Keywords

Open Access
Article
Publication date: 5 December 2023

Ali Zarifhonarvar

The study investigates the influence of ChatGPT on the labor market dynamics, aiming to provide a structured understanding of the changes induced by generative AI technologies.

4709

Abstract

Purpose

The study investigates the influence of ChatGPT on the labor market dynamics, aiming to provide a structured understanding of the changes induced by generative AI technologies.

Design/methodology/approach

An analysis of existing literature serves as the foundation for understanding the impact, while the supply and demand model helps assess the effects of ChatGPT. A text-mining approach is utilized to analyze the International Standard Occupation Classification, identifying occupations most susceptible to disruption by ChatGPT.

Findings

The study reveals that 32.8% of occupations could be fully impacted by ChatGPT, while 36.5% might experience a partial impact and 30.7% are likely to remain unaffected.

Research limitations/implications

While this study offers insights into the potential influence of ChatGPT and other generative AI services on the labor market, it is essential to note that these findings represent potential implications rather than realized labor market effects. Further research is needed to track actual changes in employment patterns and job market dynamics where these AI services are widely adopted.

Originality/value

This paper contributes to the field by systematically categorizing the level of impact on different occupations, providing a nuanced perspective on the short- and long-term implications of ChatGPT and similar generative AI services on the labor market.

Details

Journal of Electronic Business & Digital Economics, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2754-4214

Keywords

Article
Publication date: 31 October 2023

Betül Balkan Akan

This paper aims to analyze the publication structure of academic research on organizational creativity between 1975 and 2022.

Abstract

Purpose

This paper aims to analyze the publication structure of academic research on organizational creativity between 1975 and 2022.

Design/methodology/approach

Bibliographic data on organizational creativity are extracted from the Scopus database and then analyzed through VOSviewer and R Statistical Software.

Findings

This paper analyzes 416 publications on organizational creativity from 1975 to 2022. Accordingly, the study identifies the most productive countries, universities, authors, journals and prolific organizational creativity publications. Also, the study uses VOSviewer and R Statistical Software Bibliometrix Package to visualize the mapping based on co-citation, bibliographic coupling and co-occurrence of keywords.

Originality/value

The study’s main contribution is that it provides an overview of the trends and trajectories of organizational creativity, which may help researchers and practitioners comprehend the trends and future research directions.

Details

International Journal of Innovation Science, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1757-2223

Keywords

Open Access
Article
Publication date: 26 May 2023

Liyun Zeng, Rita Yi Man Li, Huiling Zeng and Lingxi Song

Global climate change speeds up ice melting and increases flooding incidents. China launched a sponge city policy as a holistic nature-based solution combined with urban planning…

1859

Abstract

Purpose

Global climate change speeds up ice melting and increases flooding incidents. China launched a sponge city policy as a holistic nature-based solution combined with urban planning and development to address flooding due to climate change. Using Weibo analytics, this paper aims to study public perceptions of sponge city.

Design/methodology/approach

This study collected 53,586 sponge city contents from Sina Weibo via Python. Various artificial intelligence tools, such as CX Data Science of Simply Sentiment, KH Coder and Tableau, were applied in the study.

Findings

76.8% of public opinion on sponge city were positive, confirming its positive contribution to flooding management and city branding. 17 out of 31 pilot sponge cities recorded the largest number of sponge cities related posts. Other cities with more Weibo posts suffered from rainwater and flooding hazards, such as Xi'an and Zhengzhou.

Originality/value

To the best of the authors’ knowledge, this study is the first to explore the public perception of sponge city in Sina Weibo.

Details

International Journal of Climate Change Strategies and Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1756-8692

Keywords

Article
Publication date: 5 January 2024

Caroline Silva Araújo, Emerson de Andrade Marques Ferreira and Dayana Bastos Costa

Tracking physical resources at the construction site can generate information to support effective decision-making and building production control. However, the methods for…

Abstract

Purpose

Tracking physical resources at the construction site can generate information to support effective decision-making and building production control. However, the methods for conventional tracking usually offer low reliability. This study aims to propose the integrated Smart Twins 4.0 to track and manage metallic formworks used in cast-in-place concrete wall systems using internet of things (IoT) (operationalized by radio frequency identification [RFID]) and building information modeling (BIM), focusing on increasing quality and productivity.

Design/methodology/approach

Design science research is the research approach, including an exploratory study to map the constructive system, the integrated system development, an on-site pilot implementation in a residential project and a performance evaluation based on acquired data and the perception of the project’s production team.

Findings

In all rounds of requests, Smart Twins 4.0 registered and presented the status from the formworks and the work progress of buildings in complete correspondence with the physical progress providing information to support decision-making during operation. Moreover, analyses of the system infrastructure and implementation details can drive researchers regarding future IoT and BIM implementation in real construction sites.

Originality/value

The primary contribution is the system proposal, centralized into a mobile app that contains a Web-based virtual model to receive data in real time during construction phases and solve a real problem. The paper describes Smart Twins 4.0 development and its requirements for tracking physical resources considering theoretical and practical previous research regarding RFID, IoT and BIM.

Details

Construction Innovation , vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1471-4175

Keywords

Article
Publication date: 7 March 2023

Ayodeji Emmanuel Oke, Ahmed Farouk Kineber, Oluwaseun Akindele and Damilola Ekundayo

To realize full benefits without sacrificing the practicality of such projects, the decision-making process for residential building construction needs to include sustainability…

Abstract

Purpose

To realize full benefits without sacrificing the practicality of such projects, the decision-making process for residential building construction needs to include sustainability principles at every level. Therefore, this paper aims to investigate the applicability of radio frequency identification (RFID) and identify the barriers that impede its successful adoption in construction projects to achieve sustainability.

Design/methodology/approach

This paper opted for a quantitative approach by using a structured questionnaire survey. A total of 107 responses were collected from Nigerian construction practitioners involved in private and public construction businesses.

Findings

The results showed the high cost of RFID implementation, with a mean score of 4.42 as the top-ranked barrier, followed by lack of security, maintenance, power availability and inadequate training. This study further deployed Ginni’s mean difference measure of dispersion and revealed that the stationary barrier to adopting RFID technology is the lack of demand.

Practical implications

The findings of this research can assist decision-makers in improving the sustainability of all building projects by implementing RFID.

Originality/value

The findings of this study will serve as the basis for comprehension and critically evaluate the numerous barriers preventing the widespread adoption of RFID technology.

Details

Journal of Engineering, Design and Technology , vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1726-0531

Keywords

Article
Publication date: 22 June 2022

Shubangini Patil and Rekha Patil

Until now, a lot of research has been done and applied to provide security and original data from one user to another, such as third-party auditing and several schemes for…

Abstract

Purpose

Until now, a lot of research has been done and applied to provide security and original data from one user to another, such as third-party auditing and several schemes for securing the data, such as the generation of the key with the help of encryption algorithms like Rivest–Shamir–Adleman and others. Here are some of the related works that have been done previously. Remote damage control resuscitation (RDCR) scheme by Yan et al. (2017) is proposed based on the minimum bandwidth. By enabling the third party to perform the verification of public integrity. Although it supports the repair management for the corrupt data and tries to recover the original data, in practicality it fails to do so, and thus it takes more computation and communication cost than our proposed system. In a paper by Chen et al. (2015), using broadcast encryption, an idea for cloud storage data sharing has been developed. This technique aims to accomplish both broadcast data and dynamic sharing, allowing users to join and leave a group without affecting the electronic press kit (EPK). In this case, the theoretical notion was true and new, but the system’s practicality and efficiency were not acceptable, and the system’s security was also jeopardised because it proposed adding a member without altering any keys. In this research, an identity-based encryption strategy for data sharing was investigated, as well as key management and metadata techniques to improve model security (Jiang and Guo, 2017). The forward and reverse ciphertext security is supplied here. However, it is more difficult to put into practice, and one of its limitations is that it can only be used for very large amounts of cloud storage. Here, it extends support for dynamic data modification by batch auditing. The important feature of the secure and efficient privacy preserving provable data possession in cloud storage scheme was to support every important feature which includes data dynamics, privacy preservation, batch auditing and blockers verification for an untrusted and an outsourced storage model (Pathare and Chouragadec, 2017). A homomorphic signature mechanism was devised to prevent the usage of the public key certificate, which was based on the new id. This signature system was shown to be resistant to the id attack on the random oracle model and the assault of forged message (Nayak and Tripathy, 2018; Lin et al., 2017). When storing data in a public cloud, one issue is that the data owner must give an enormous number of keys to the users in order for them to access the files. At this place, the knowledge assisted software engineering (KASE) plan was publicly unveiled for the first time. While sharing a huge number of documents, the data owner simply has to supply the specific key to the user, and the user only needs to provide the single trapdoor. Although the concept is innovative, the KASE technique does not apply to the increasingly common manufactured cloud. Cui et al. (2016) claim that as the amount of data grows, distribution management system (DMS) will be unable to handle it. As a result, various proven data possession (PDP) schemes have been developed, and practically all data lacks security. So, here in these certificates, PDP was introduced, which was based on bilinear pairing. Because of its feature of being robust as well as efficient, this is mostly applicable in DMS. The main purpose of this research is to design and implement a secure cloud infrastructure for sharing group data. This research provides an efficient and secure protocol for multiple user data in the cloud, allowing many users to easily share data.

Design/methodology/approach

The methodology and contribution of this paper is given as follows. The major goal of this study is to design and implement a secure cloud infrastructure for sharing group data. This study provides an efficient and secure protocol for multiple user data in cloud, allowing several users to share data without difficulty. The primary purpose of this research is to design and implement a secure cloud infrastructure for sharing group data. This research develops an efficient and secure protocol for multiple user data in the cloud, allowing numerous users to exchange data without difficulty. Selection scheme design (SSD) comprises two algorithms; first algorithm is designed for limited users and algorithm 2 is redesigned for the multiple users. Further, the authors design SSD-security protocol which comprises a three-phase model, namely, Phase 1, Phase 2 and Phase 3. Phase 1 generates the parameters and distributes the private key, the second phase generates the general key for all the users that are available and third phase is designed to prevent the dishonest user to entertain in data sharing.

Findings

Data sharing in cloud computing provides unlimited computational resources and storage to enterprise and individuals; moreover, cloud computing leads to several privacy and security concerns such as fault tolerance, reliability, confidentiality and data integrity. Furthermore, the key consensus mechanism is fundamental cryptographic primitive for secure communication; moreover, motivated by this phenomenon, the authors developed SSDmechanismwhich embraces the multiple users in the data-sharing model.

Originality/value

Files shared in the cloud should be encrypted for security purpose; later these files are decrypted for the users to access the file. Furthermore, the key consensus process is a crucial cryptographic primitive for secure communication; additionally, the authors devised the SSD mechanism, which incorporates numerous users in the data-sharing model, as a result of this phenomena. For evaluation of the SSD method, the authors have considered the ideal environment of the system, that is, the authors have used java as a programming language and eclipse as the integrated drive electronics tool for the proposed model evaluation. Hardware configuration of the model is such that it is packed with 4 GB RAM and i7 processor, the authors have used the PBC library for the pairing operations (PBC Library, 2022). Furthermore, in the following section of this paper, the number of users is varied to compare with the existing methodology RDIC (Li et al., 2020). For the purposes of the SSD-security protocol, a prime number is chosen as the number of users in this work.

Details

International Journal of Pervasive Computing and Communications, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1742-7371

Keywords

1 – 10 of 151