Search results

1 – 10 of 22
Article
Publication date: 22 August 2022

Ratnmala Nivrutti Bhimanpallewar, Sohail Imran Khan, K. Bhavana Raj, Kamal Gulati, Narinder Bhasin and Roop Raj

Federation analytics approaches are a present area of study that has already progressed beyond the analysis of metrics and counts. It is possible to acquire aggregated information…

40

Abstract

Purpose

Federation analytics approaches are a present area of study that has already progressed beyond the analysis of metrics and counts. It is possible to acquire aggregated information about on-device data by training machine learning models using federated learning techniques without any of the raw data ever having to leave the devices in the issue. Web browser forensics research has been focused on individual Web browsers or architectural analysis of specific log files rather than on broad topics. This paper aims to propose major tools used for Web browser analysis.

Design/methodology/approach

Each kind of Web browser has its own unique set of features. This allows the user to choose their preferred browsers or to check out many browsers at once. If a forensic examiner has access to just one Web browser's log files, he/she makes it difficult to determine which sites a person has visited. The agent must thus be capable of analyzing all currently available Web browsers on a single workstation and doing an integrated study of various Web browsers.

Findings

Federated learning has emerged as a training paradigm in such settings. Web browser forensics research in general has focused on certain browsers or the computational modeling of specific log files. Internet users engage in a wide range of activities using an internet browser, such as searching for information and sending e-mails.

Originality/value

It is also essential that the investigator have access to user activity when conducting an inquiry. This data, which may be used to assess information retrieval activities, is very critical. In this paper, the authors purposed a major tool used for Web browser analysis. This study's proposed algorithm is capable of protecting data privacy effectively in real-world experiments.

Details

International Journal of Pervasive Computing and Communications, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 5 September 2024

Hanjabam Isworchandra Sharma and Shukhdeba Sharma Hanjabam

Drug trafficking in the tiny state of Manipur, located in the northeastern part of India bordering Myanmar, has drawn attention from all over the globe looking at the scale and…

Abstract

Purpose

Drug trafficking in the tiny state of Manipur, located in the northeastern part of India bordering Myanmar, has drawn attention from all over the globe looking at the scale and varieties of drugs trafficked, ranging from plant-based opiates to synthetic-based amphetamine-type stimulants (ATS). Moreover, drug trafficking in the region also comes with many socio-political dynamics such as high per-capita drug consumption, local drug manufacturing units, terror funding from drug money, politician–drug lord nexus, police–peddler nexus.

Design/methodology/approach

The study is based on data from the years 2007 to 2023 accessed from the Narcotics and Affairs of Borders, a specialized branch of Manipur Police, Government of Manipur. The study also tries to estimate the state’s drug economy using the Financial Action Task Force and the United Nations Office on Drugs and Crime methodology.

Findings

The study finds seizure of a massive cache of heroin/brown sugar, and ATS in the past 4–5 years. The study also finds large-scale destruction of poppy plants in the state. The study also finds a high percentage of ethnic minority communities involved in drug trafficking. The study found the value amounting to US$62m in 2022. The study also comes across low conviction rates of drug traffickers in the state.

Originality/value

The study emphasizes the need for expediting the War on Drugs campaign in the state curtailing poppy cultivation and conviction of drug lords so that the nerve center of terror funding in India’s eastern front is kept under control.

Details

Journal of Money Laundering Control, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1368-5201

Keywords

Open Access
Article
Publication date: 15 June 2021

Sarandis Mitropoulos, Christos Mitsis, Petros Valacheas and Christos Douligeris

The purpose of this paper is to investigate the way technology affects the provision of prehospital emergency care, upgrading the quality of services offered and significantly…

2892

Abstract

Purpose

The purpose of this paper is to investigate the way technology affects the provision of prehospital emergency care, upgrading the quality of services offered and significantly reducing the risk of premature termination of the patients.

Design/methodology/approach

The paper presents the development of the eEKAB, a pilot emergency medical information system that simulates the main services offered by the Greek National Instant Aid Centre (EKAB). The eEKAB was developed on an agile system methodology. From a technical perspective, the features and the technology were mainly chosen to provide reliable and user-friendly interfaces that will attract many users. eEKAB is based on three important pillars for offering health care to the patients: the “On-time Incident Reporting”, the “On-time Arrival at the Incident” and “Transfer to the Health Center”. According to the literature review, the emergency medical services (EMS) systems that combine all the features are very few.

Findings

It reduces the total time of the EMS procedures and it allows for an easier management of EMS, by providing a better allocation of human resources and a better geographical distribution of ambulances. The evaluation displayed that it is a very helpful application for the ambulance drivers as it reduces the ambulance response time to arrive in the patient's location and contributes significantly to the general performance of the prehospital medical care system. Also, the survey verified the importance of implementing eEKAB on a larger scale beyond the pilot usage. It is worth mentioning that the younger ambulance drivers had a more positive view for the purpose of the application.

Research limitations/implications

The paper clearly identifies implications for further research. Regarding interoperability, the mobile app cooperates with the Operational Center of EKAB, while further collaboration could be achieved with other operational ambulance handling center, mainly, of the private sector. The system can evolve to include better communications among the EKAB departments. Particularly, the ambulance crew as well as the doctors should be informed with more incident features such as the emergency signal so that they know whether to open the siren, the patient's name, etc. The authors are currently working on implementing some features to provide effective medical health services to the patient in the ambulance.

Practical implications

eEKAB will have very significant implications in case of its enforcement, such as the reduction of the total time of EMS procedures with a corresponding reduction of the operating costs of an accident management system and an ambulance fleet handling system while in parallel informing in time the doctors/clinics. It will provide better distribution of ambulances as well as of total human resources. It will greatly assist ambulance drivers, while reducing ambulance response time to reach the patient's location. In other words, the authors will have a better performance of the whole prehospital care system.

Social implications

Providing emergency care before the hospital is of great importance for upgrading the quality of health services provided at the accident site, thus significantly reducing the risk of premature death of patients. This in itself has a significant social implication.

Originality/value

The paper demonstrates a solid understanding in the field of the EMS systems and the corresponding medical services offered. It proposes the development of an effective, feasible and innovative EMS information system that will improve the existing emergency health care system in Greece (EKAB). An in depth literature review and presentation of the adopted new technologies and the respective architecture take place. An evaluation and statistical validation were conducted for proving the high applicability of eEKAB in case of real-life running.

Details

Applied Computing and Informatics, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2634-1964

Keywords

Article
Publication date: 8 June 2023

Sobah Abbas Petersen, Tor Åsmund Evjen and John Krogstie

The main aim of this paper is to describe the potential benefits of enterprise building information models (EBIMs) for health-care institutions. The main research question…

Abstract

Purpose

The main aim of this paper is to describe the potential benefits of enterprise building information models (EBIMs) for health-care institutions. The main research question addressed is how data from EBIM could be leveraged to create value for hospitals beyond design, construction and traditional facility management.

Design/methodology/approach

Three different prototypes, which use different technologies in combination with EBIM, are described to illustrate different uses of EBIM within the context of a hospital and health-care operations. The case study approach has been used to present the prototypes.

Findings

EBIM data, in combination with other data sources, increases the potential benefits of the data with respect to many health-care-related processes, during the operation of a health-care institution. The benefits of EBIM span beyond the design and construction life cycle phases of a hospital and provide value to a variety of stakeholders in multiple health-care-related processes.

Research limitations/implications

The main limitation of this work is the limited sources of data and information such as the specific methods that were used in the design and development of each of the prototypes and a deeper insight into the design rationale and decisions. Another limitation of this paper is that the findings have not been validated.

Practical implications

This study demonstrates the value of convergence of a number of technologies such as EBIM, data and different types of technologies, throughout the life cycle of a building. This study also highlights the value of building information models (BIMs) data for supporting the design of novel educational and other types of application areas. The practical implications include the value for multiple stakeholders, such as resources planning, fleet and equipment management and contract negotiation. Benefits identified for resource planning can have strategic and financial implications at the management level. For patients, visitors and health-care personnel, there may be reduced infections, cleaner and pleasant facilities as well as a reduction of time to find relevant resources.

Social implications

Social implications" could be replaced by "For patients, visitors and health-care personnel, there may be cleaner and pleasant facilities and easy navigation support through the hospital. Furthermore, enhanced access to knowledge and information about the artefact and assets in the hospital can enhance learning and knowledge sharing.

Originality/value

This study identifies the lack of research in using BIM with other data for value-added services for multiple stakeholders in the operations phase of a hospital and addresses that research gap.

Details

Journal of Facilities Management , vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1472-5967

Keywords

Article
Publication date: 21 February 2024

Azra Rafique, Kanwal Ameen and Alia Arshad

This study aims to explore the evidence-based usage patterns of higher education commission (HEC) subscribed e-journal databases in the university digital library used by the…

Abstract

Purpose

This study aims to explore the evidence-based usage patterns of higher education commission (HEC) subscribed e-journal databases in the university digital library used by the scholarly community and the academics’ online searching behaviour at a higher education institution in Pakistan.

Design/methodology/approach

The study used an explanatory sequential mixed methods approach. Raw transaction log data were collected for quantitative analysis, and the interview technique was used for qualitative data collection and thematic analysis.

Findings

Log analysis revealed that HEC subscribed databases were used significantly, and among those, scholarly databases covering various subjects were more frequently used than subject-specific society-based databases. Furthermore, the users frequently accessed the needed e-journal articles through search engines like Google and Google Scholar, considering them sources of free material instead of the HEC subscribed databases.

Practical implications

It provides practical implications for examining the evidence-based use patterns of e-journal databases. It suggests the need for improving the access management of HEC databases, keeping in view the usage statistics and the demands of the scholars. The study may also help create market venues for the publishers of scholarly databases by offering attractive and economical packages for researchers of various disciplines in developing and underdeveloped countries. The study results also guide the information professionals to arrange orientation and information literacy programs to improve the searching behaviour of their less frequent users and enhance the utilization of these subscribed databases.

Originality/value

The study is part of a PhD project and, to the best of the authors’ knowledge, is the first such work in the context of a developing country like Pakistan.

Details

Global Knowledge, Memory and Communication, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2514-9342

Keywords

Article
Publication date: 3 March 2023

Shing Cheong Hui, Ming Yung Kwok, Elaine W.S. Kong and Dickson K.W. Chiu

Although cloud storage services can bring users valuable convenience, they can be technically complex and intrinsically insecure. Therefore, this research explores the concerns of…

Abstract

Purpose

Although cloud storage services can bring users valuable convenience, they can be technically complex and intrinsically insecure. Therefore, this research explores the concerns of academic users regarding cloud security and technical issues and how such problems may influence their continuous use in daily life.

Design/methodology/approach

This qualitative study used a semi-structured interview approach comprising six main open-ended questions to explore the information security and technical issues for the continuous use of cloud storage services by 20 undergraduate students in Hong Kong.

Findings

The analysis revealed cloud storage service users' major security and technical concerns, particularly synchronization and backup issues, were the most significant technical barrier to the continuing personal use of cloud storage services.

Originality/value

Existing literature has focused on how cloud computing services could bring benefits and security and privacy-related risks to organizations rather than security and technical issues of personal use, especially in the Asian academic context.

Details

Library Hi Tech, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0737-8831

Keywords

Article
Publication date: 16 April 2024

Sanjay Gupta, Sahil Raj, Aashish Garg and Swati Gupta

The primary purpose of this study is to examine the factors leading to shopping cart abandonment and construct a model depicting interrelationship among them using interpretive…

Abstract

Purpose

The primary purpose of this study is to examine the factors leading to shopping cart abandonment and construct a model depicting interrelationship among them using interpretive structural modeling (ISM) and Matriced Impact Croises Multiplication Appliquee an un Classement (MICMAC).

Design/methodology/approach

Initially, 20 factors leading to shopping cart abandonment were extracted through a systematic literature review and expert opinions. Fifteen factors were finalized using the importance index and CIMTC method, for which consistency has been checked in SPSS software through a statistical reliability test. Finally, ISM and MICMAC approach is used to develop a model depicting the contextual relationship among finalized factors of shopping cart abandonment.

Findings

The ISM model depicts a technical glitch (SC8), cash on delivery not available (SC4), bad checkout interface (SC9), just browsing (SC11), and lack of physical examination (SC12) are drivers or independent factors. Additionally, four quadrants have been formulated in MICMAC analysis based on their dependency and driving power. This facilitates technical managers of e-commerce companies to focus more on factors leading to shopping cart abandonment according to their dependency and driving power.

Research limitations/implications

Taking an expert’s opinion as a base may affect the results of the study due to biases based on subjectivity.

Practical implications

This study’s outcomes would accommodate practitioners, researchers, and multinational or national companies to indulge in e-commerce to anticipate factors restricting the general public from online shopping.

Originality/value

For the successful running of an e-commerce business and to retain the confidence of e-shoppers, every e-commerce company must make a strategy for controlling factors leading to shopping cart abandonment at the initial stage. So, this paper attempts to highlight the main factors leading to shopping cart abandonment and interrelate them using ISM and MICMAC approaches. It provides a clear path to technical heads, researchers, and consultants for handling these shopping cart abandonment factors.

Details

International Journal of Quality & Reliability Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0265-671X

Keywords

Article
Publication date: 5 June 2024

Travis L. Wagner

This article reports on findings from interviews with ICT-based content creators whose work focuses on documenting and curating queer history and culture. The research…

Abstract

Purpose

This article reports on findings from interviews with ICT-based content creators whose work focuses on documenting and curating queer history and culture. The research specifically examines how as amateur historians, the participant’s embodied knowledge plays a central role in how they engage with discourse about queer historical figures, methods of queer historiography and community accountability.

Design/methodology/approach

The research deploys a queer constructivist framework to qualitatively gather and analyzes the semi-structured interviews of 31 North American content creators who curate digital project related to queer history and culture. The interviews were gathered between August 2022 and August 2023.

Findings

The research highlights how the subjectivity of queer embodiment aids, rather than hinders, participants' ability to collaborate with LGBTQIA+ communities while also addressing more significant ethical questions around intersectionality and inclusive historiographic work.

Research limitations/implications

The content creators’ own positionality and commitments to community accountability and queer inclusivity fostered richer stories and historical documentation, while also helping make visible queer identity as affirming and valuable within queer culture. Additionally, practical implications include highlighting the value of ICT-based content within the distribution of educational and informational resources related to queer history.

Originality/value

This research offers an underexamined intersection of historiography and queer embodiment. While extensive scholarship on institutional and community-based historiography work exist the content creators interviewed within this study exist within the space of both, often using a combination of embodied knowledge and traditional curatorial work to translate between such spaces, inviting, in turn, new ways of thinking about queer archival knowledge.

Details

Journal of Documentation, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0022-0418

Keywords

Article
Publication date: 30 June 2023

Ruan Wang, Jun Deng, Xinhui Guan and Yuming He

With the development of data mining technology, diverse and broader domain knowledge can be extracted automatically. However, the research on applying knowledge mapping and data…

216

Abstract

Purpose

With the development of data mining technology, diverse and broader domain knowledge can be extracted automatically. However, the research on applying knowledge mapping and data visualization techniques to genealogical data is limited. This paper aims to fill this research gap by providing a systematic framework and process guidance for practitioners seeking to uncover hidden knowledge from genealogy.

Design/methodology/approach

Based on a literature review of genealogy's current knowledge reasoning research, the authors constructed an integrated framework for knowledge inference and visualization application using a knowledge graph. Additionally, the authors applied this framework in a case study using “Manchu Clan Genealogy” as the data source.

Findings

The case study shows that the proposed framework can effectively decompose and reconstruct genealogy. It demonstrates the reasoning, discovery, and web visualization application process of implicit information in genealogy. It enhances the effective utilization of Manchu genealogy resources by highlighting the intricate relationships among people, places, and time entities.

Originality/value

This study proposed a framework for genealogy knowledge reasoning and visual analysis utilizing a knowledge graph, including five dimensions: the target layer, the resource layer, the data layer, the inference layer, and the application layer. It helps to gather the scattered genealogy information and establish a data network with semantic correlations while establishing reasoning rules to enable inference discovery and visualization of hidden relationships.

Details

Library Hi Tech, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0737-8831

Keywords

Article
Publication date: 28 July 2023

Bidyut Hazarika, Utkarsh Shrivastava, Vivek Kumar Singh and Alan Rea

The COVID-19 pandemic has had far-reaching effects on society and will continue to be a subject of study for researchers in the years to come. Businesses have implemented…

Abstract

Purpose

The COVID-19 pandemic has had far-reaching effects on society and will continue to be a subject of study for researchers in the years to come. Businesses have implemented technologies that reduce reliance on physical currencies, such as e-commerce sites and contactless payments. This study aims to examine the users’ attitudes and behaviors toward mobile payments. The focus is on identifying the most effective techniques and approaches that businesses can use to encourage user adoption of mobile payments.

Design/methodology/approach

This study uses survey data from 396 active mobile payment users across the mid-west region of the USA to test the proposed hypothesis. The snowball sampling approach is used to sample the participants for the data collection. This study uses partial least squares structural equation modeling to test the ten hypotheses proposed in this study.

Findings

This study finds that organizational commitment and privacy customization can significantly overcome users’ protective attitudes toward mobile payments during the pandemic. In addition, providing users with privacy customization options can significantly encourage self-disclosure, which is crucial for transaction authentication and fraud detection.

Originality/value

Envisioned in the backdrop of the COVID pandemic, this is one of the earliest studies investigating the role of privacy customization, self-disclosure and organizational commitment on mobile payment adoption.

Details

Global Knowledge, Memory and Communication, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2514-9342

Keywords

1 – 10 of 22