Search results
1 – 10 of 26In the COVID-19 era, sign language (SL) translation has gained attention in online learning, which evaluates the physical gestures of each student and bridges the communication…
Abstract
Purpose
In the COVID-19 era, sign language (SL) translation has gained attention in online learning, which evaluates the physical gestures of each student and bridges the communication gap between dysphonia and hearing people. The purpose of this paper is to devote the alignment between SL sequence and nature language sequence with high translation performance.
Design/methodology/approach
SL can be characterized as joint/bone location information in two-dimensional space over time, forming skeleton sequences. To encode joint, bone and their motion information, we propose a multistream hierarchy network (MHN) along with a vocab prediction network (VPN) and a joint network (JN) with the recurrent neural network transducer. The JN is used to concatenate the sequences encoded by the MHN and VPN and learn their sequence alignments.
Findings
We verify the effectiveness of the proposed approach and provide experimental results on three large-scale datasets, which show that translation accuracy is 94.96, 54.52, and 92.88 per cent, and the inference time is 18 and 1.7 times faster than listen-attend-spell network (LAS) and visual hierarchy to lexical sequence network (H2SNet) , respectively.
Originality/value
In this paper, we propose a novel framework that can fuse multimodal input (i.e. joint, bone and their motion stream) and align input streams with nature language. Moreover, the provided framework is improved by the different properties of MHN, VPN and JN. Experimental results on the three datasets demonstrate that our approaches outperform the state-of-the-art methods in terms of translation accuracy and speed.
Details
Keywords
Prakriti Dumaru, Ankit Shrestha, Rizu Paudel, Cassity Haverkamp, Maryellen Brunson McClain and Mahdi Nasrullah Al-Ameen
The purpose of this study is to understand user perceptions and misconceptions regarding security tools. Security and privacy-preserving tools (for brevity, the authors term them…
Abstract
Purpose
The purpose of this study is to understand user perceptions and misconceptions regarding security tools. Security and privacy-preserving tools (for brevity, the authors term them as “security tools” in this paper, unless otherwise specified) are designed to protect the security and privacy of people in the digital environment. However, inappropriate use of these tools can lead to unexpected consequences that are preventable. Hence, it is significant to examine why users do not understand the security tools.
Design/methodology/approach
The authors conducted a qualitative study with 40 participants in the USA to investigate the prevalent misconceptions of people regarding security tools, their perceptions of data access and the corresponding impact on their usage behavior and data protection strategies.
Findings
While security vulnerabilities are often rooted in people’s internet usage behavior, this study examined user’s mental models of the internet and unpacked how the misconceptions about security tools relate to those mental models.
Originality/value
Based on the findings, this study offers recommendations highlighting the design aspects of security tools that need careful attention from researchers and industry practitioners, to alleviate users’ misconceptions and provide them with accurate conceptual models toward the desired use of security tools.
Details
Keywords
Anam Jamal Ansari and Naushad Ali PM
This paper aims to find out the digital services of management libraries provided during the library closure and the challenges and initiatives the libraries have taken up to…
Abstract
Purpose
This paper aims to find out the digital services of management libraries provided during the library closure and the challenges and initiatives the libraries have taken up to fulfill the need of their user community during the pandemic crisis.
Design/methodology/approach
To meet the purpose of the study, the investigators have used a survey method. An online questionnaire was devised and administered among the Indian Institutes of Management (IIMs) librarians using Microsoft Forms.
Findings
The study's findings suggested that all the libraries under investigation must avail of various digital library services in the wake of the coronavirus pandemic. Further, the investigators recommend that libraries formulate a disaster preparedness and management plan in the wake of the COVID-19 pandemic so that libraries can prepare themselves for the future.
Originality/value
The pandemic has affected every aspect of life and changed the digital library services scenario. Thus, it is essential to examine the role libraries have played during the COVID-19 pandemic and distinguish the challenges and initiatives libraries have taken to tackle the problems they faced. This study has been conducted on the digital library services that were provided by the libraries of IIMs.
Details
Keywords
This article surveys why libraries are vulnerable to social engineering attacks and how to manage risks of human-caused cyber threats on organizational level; investigates…
Abstract
Purpose
This article surveys why libraries are vulnerable to social engineering attacks and how to manage risks of human-caused cyber threats on organizational level; investigates Estonian library staff awareness of information security and shares recommendations concerning focus areas that should be given more attention in the future.
Design/methodology/approach
The data used in this paper is based on an overview of relevant literature highlighting the theoretical points and giving the reasons why human factor is considered the weakest link in information security and cyber security and studying how to mitigate the related risks in the organisation. To perform the survey, a web questionnaire was designed which included 63 sentences and was developed based on the knowledge-attitude-behaviour (KAB) model supported by Kruger and Kearney and Human Aspects of Information Security Questionnaire (HAIS-Q) designed by Parsons et al.
Findings
The research results show that the information security awareness of library employees is at a good level; however, awareness in two focus areas needs special attention and should be improved. The output of this study is the mapping of seven focus areas of information security policy in libraries based on the HAIS-Q framework and the KAB model.
Originality/value
The cyber awareness of library employees has not been studied in the world using HAIS-Q and KAB model, and to the best of the authors’ knowledge, no research has been previously carried out in the Estonian library context into cyber security awareness.
Details
Keywords
Zeljko Tekic, Andrei Parfenov and Maksim Malyy
Starting from intention–behaviour models and building upon the growing evidence that aggregated internet search query data represent a good proxy of human interests and…
Abstract
Purpose
Starting from intention–behaviour models and building upon the growing evidence that aggregated internet search query data represent a good proxy of human interests and intentions. The purpose of this study is to demonstrate that the internet search traffic information related to the selected key terms associated with establishing new businesses, reflects well the dynamics of entrepreneurial activity in a country and can be used for predicting entrepreneurial activity at the national level.
Design/methodology/approach
Theoretical framework is based on intention–behaviour models and supported by the knowledge spillover theory of entrepreneurship. Monthly data on new business registration from 2018 to 2021 is derived from the open database of the Russian Federal Tax Service. Terms of internet search interest are identified through interviews with the recent founders of new businesses, whereas the internet search query statistics on the identified terms are obtained from Google Trends and Yandex Wordstat.
Findings
The results suggest that aggregated data about web searches related to opening a new business in a country is positively correlated with the dynamics of entrepreneurial activity in the country and, as such, may be useful for predicting the level of that activity.
Practical implications
The results may serve as a starting point for a new approach to measure, monitor and predict entrepreneurial activities in a country and can help in better addressing policymaking issues related to entrepreneurship.
Originality/value
To the best of the authors’ knowledge, this study is original in its approach and results. Building on intention–behaviour models, this study outlines, to the best of the authors’ knowledge, the first usage of big data for analysing the intention–behaviour relationship in entrepreneurship. This study also contributes to the ongoing debate about the value of big data for entrepreneurship research by proposing and demonstrating the credibility of internet search query data as a novel source of quality data in analysing and predicting a country’s entrepreneurial activity.
Details
Keywords
Nadeem Siddique, Muhammad Safdar, Adeel Ahmad and Muhammad Ajmal Khan
The paper aims to systematically collect and review the literature on work from home (WFH) and libraries. Another objective of the review is to identify the services professionals…
Abstract
Purpose
The paper aims to systematically collect and review the literature on work from home (WFH) and libraries. Another objective of the review is to identify the services professionals offered while WFH, tools used, challenges and opportunities in this connection.
Design/methodology/approach
The study consulted four databases, namely, Web of Science, Scopus, Google Scholar and Library, Information Science and Technology Abstracts, to collect and review the literature on the topic. Preferred Reporting Items for Systematic Reviews and Meta-Analyses guideline was used to select the eligible studies for this review. A total of 27 studies out of 1,571 were considered eligible for the study. The authors also consulted Boynton and Greenhalgh (2004) guide for assessing the quality of the reviewed research. All types of studies and except books were selected for the review. However, the researchers did not apply the time limitation.
Findings
The research identified that libraries provided various services, including Mystery Box, live chat and 24-hour service, using different tools, including MS Teams, Zoom and Google Meet, while WFH. The study shared different challenges and opportunities identified from the reviewed literature, for libraries.
Originality/value
To the best of the authors’ knowledge, this is the first systematic review conducted to systematically collect and review the literature produced on WFH in terms of libraries regarding offered services, tools used to serve the users, challenges and opportunities. The review filled the literature gap and shared implications for library professionals and related stakeholders.
Details
Keywords
Henry Jarva and Teresa Zeitler
The purpose of this paper is to examine the implications of the COVID-19 pandemic on internal auditing as the pandemic forced individual internal auditors and audit teams to…
Abstract
Purpose
The purpose of this paper is to examine the implications of the COVID-19 pandemic on internal auditing as the pandemic forced individual internal auditors and audit teams to conduct the work remotely.
Design/methodology/approach
Five in-depth semi-structured interviews of internal audit experts that work in German retail and manufacturing industry were conducted between February and April 2021.
Findings
The authors find that the importance of audit technologies did not change significantly due to the pandemic, as audit technologies were already an integral part of internal audits. Interestingly, the transition to remote audits occurred with remarkable speed and efficiency. The presence of well-functioning information and communication technologies emerges as a critical facilitator for effective remote communication, collaboration and data exchange. However, audit technologies can only partially replace physical on-site examinations and human interaction. The main challenges of remote audits are related to the auditing of non-digitalized processes and the inherent limitations of auditee interviews and interactions.
Research limitations/implications
The authors' interview approach does not allow to cover variations between industries and between countries. While internal audit experts provided notably consistent responses during the interviews, acknowledging that the sample size is very small is important.
Practical implications
The COVID-19 pandemic serves as a catalyst for increased digitalization and technology adoption within the realm of internal auditing. A hybrid approach combining the benefits of on-site and remote audits is expected to prevail in the future.
Originality/value
The paper is among the first to document the effects of the COVID-19 pandemic on the work of internal auditing using field-based research methods.
Details
Keywords
Philip Hong Wei Jiang and William Yu Chung Wang
The purpose of this paper is to explain how enterprise resource planning (ERP) implementation evolves by cloud computing in different industries with different delivery models of…
Abstract
Purpose
The purpose of this paper is to explain how enterprise resource planning (ERP) implementation evolves by cloud computing in different industries with different delivery models of cloud ERP. This paper also investigates infrastructure as a service (IaaS) as a delivery approach for cloud ERP. Case research on IaaS is rarely found in the literature. In addition, this paper intends to reveal how this transformation from on-premises to the cloud would influence the ERP implementation process.
Design/methodology/approach
A multiple-case study is conducted to identify the different deployed models of cloud ERP systems in the implementation projects. The influences of emerging cloud computing technology on ERP implementation are investigated by interviewing consultants related to the projects.
Findings
The findings illustrate that not only software as a service (SaaS) but also IaaS and platform as a service cloud computing services are widely applied in cloud ERP implementation. This study also indicates that certain technical limitations of cloud ERP might have a positive effect on the outcome of ERP implementation.
Originality/value
This study investigates how cloud computing influences ERP implementation from different aspects. The result identifies both SaaS and IaaS as two different approaches widely adopted in cloud ERP implementation. Besides, this study has discussed in-depth and analyzed these two cloud ERP paradigms in five factors, including functionality, performance, portability, security, cost and customization. The classification and suggestions are original to the literature.
Details
Keywords
Li Chen, Yiwen Chen and Yang Pan
This study aims to empirically test how sponsored video customization (i.e. the degree to which a sponsored video is customized for a sponsoring brand) affects video shares…
Abstract
Purpose
This study aims to empirically test how sponsored video customization (i.e. the degree to which a sponsored video is customized for a sponsoring brand) affects video shares differently depending on influencer characteristics (i.e. mega influencer and expert influencer) and brand characteristics (i.e. brand establishment and product involvement).
Design/methodology/approach
This study uses a unique real-world data set that combines coded variables (e.g. customization) and objective video performance (e.g. sharing) of 365 sponsored videos to test the hypotheses. A negative binomial model is used to analyze the data set.
Findings
This study finds that the effect of video customization on video shares varies across contexts. Video customization positively affects shares if they are made for well-established brands and high-involvement products but negatively influences shares if they are produced by mega and expert influencers.
Research limitations/implications
This study extends the influencer marketing literature by focusing on a new media modality – sponsored video. Drawing on the multiple inference model and the persuasion knowledge theory, this study teases out different conditions under which video customization is more or less likely to foster audience engagement, which both influencers and brands care about. The chosen research setting may limit the generalizability of the findings of this study.
Practical implications
The findings suggest that mega and expert influencers need to consider if their endorsement would backfire on a highly customized video. Brands that aim to engage customers with highly-customized videos should gauge their decision by taking into consideration their years of establishment and product involvement. For video-sharing platforms, especially those that are planning to expand their businesses to include “matching-making services” for brands and influencers, the findings provide theory-based guidance on optimizing such matches.
Originality/value
This paper fulfills an urgent research need to study how brands and influencers should produce sponsored videos to achieve optimal outcomes.
Details