Search results

1 – 10 of 325
Article
Publication date: 12 July 2022

Karol Król and Dariusz Zdonek

Rural tourism facilities in Poland were very keen on amateur websites to promote their hospitality services from 2000 to 2018. In most cases, the websites were nonprofessional…

Abstract

Purpose

Rural tourism facilities in Poland were very keen on amateur websites to promote their hospitality services from 2000 to 2018. In most cases, the websites were nonprofessional, hosted on free servers and made by family members or friends of the holding. After search engine algorithms changed in 2015–2019, the websites started to go extinct on a large scale; they were deleted and often replaced with a more modern design and a commercial domain. These resources offered a rare opportunity to gain insight into rural tourism, rural changes and socioeconomic and cultural phenomena.

Design/methodology/approach

The paper’s objective is to demonstrate with an analysis of archived Polish rural tourism websites that digital cultural artefacts are generated in rural areas. The study was an analysis of selected development attributes of rural tourism websites found in the Internet Archive. The analysis involved those attributes that are important for determining whether a website or content can be considered digital cultural heritage assets.

Findings

The conclusions demonstrate that rural digital cultural heritage is a set of digital artefacts created in rural areas with their characteristics. Rural digital artefacts are records of ICT, infrastructure, environmental, cultural and socioeconomic changes.

Originality/value

The “digital assets” of rural areas are yet to be discussed in the context of rural cultural heritage, as a set of artefacts created in these areas and characteristic of them.

Details

Global Knowledge, Memory and Communication, vol. 73 no. 3
Type: Research Article
ISSN: 2514-9342

Keywords

Article
Publication date: 17 November 2023

Laura Broccardo, Paola Vola, Safiya Mukhtar Alshibani and Riccardo Tiscini

Digitalization is affecting business management and pushing for new strategies, innovative products, new ways to communicate with stakeholders and new channels. This phenomenon is…

Abstract

Purpose

Digitalization is affecting business management and pushing for new strategies, innovative products, new ways to communicate with stakeholders and new channels. This phenomenon is unavoidable, and companies have to face it in a holistic and integrated way. One holistic and interconnected approach, when studying enterprise challenges, is represented by the business process management method, a fitting mechanism when digitalization needs to be amalgamated in business practices, enhancing the intellectual capital (IC), therefore, this study researches digitalization under business process lens, in a sample of small and medium enterprises (SMEs), that constitute an under-explored set, as regard digitalization, process management and IC. The research aims to explore the digital tools and business processes link and the related impact on performance, benefits and IC.

Design/methodology/approach

In exploring digitalization, a sample of Italian SMEs was scrutinized. The data were elaborated using two types of tests: (1) the binomial tests for the categorical questions and (2) the zeta test was used for quantitative variables. Furthermore, the partial least square (PLS)-SEM model was applied.

Findings

Findings reveal that some digital tools are more adopted in the sample analysed, and also some particular digital tools are more inclined to support certain business processes. Furthermore, not only performance benefits emerge, but also benefits in terms of better communication and faster decisions, supporting the decision making process of managers, also considering that business processes approach is one way to manage IC.

Practical implications

Thanks to the conducted research it is possible to make aware managers and owners of SMEs to consciously choose the right type of digitalization investments, without neglecting training programme, to realize the company digital transformation, providing a map and bearing in mind the value added creation, protecting their IC.

Originality/value

The paper's originality is represented by the contribution in opening the black box about digitalization, business process management and IC in small and medium companies.

Details

Journal of Intellectual Capital, vol. 25 no. 1
Type: Research Article
ISSN: 1469-1930

Keywords

Article
Publication date: 9 April 2024

Iftikhar Ahmad, Salim Khan and Shahid Iqbal

The purpose of this paper is to investigate and analyze the adoption of digital technologies in the banking industry and its impact on the rise of digital fraudulent activities…

Abstract

Purpose

The purpose of this paper is to investigate and analyze the adoption of digital technologies in the banking industry and its impact on the rise of digital fraudulent activities, specifically focusing on online banking frauds. This paper aims to provide insights into the current technologies implemented by banks to secure their online banking systems and explores the methods used by cybercriminals to exploit security vulnerabilities in these systems.

Design/methodology/approach

In order to understand how digital technologies in banking can be secured against online fraud, this research conducted a systematic literature review (SLR) on digital banking, online banking fraud, and security measurements. The review encompasses a variety of sources from online databases such as Emerald Insight, Google Scholar, IEEE, JSTOR, Springer and Science Direct.

Findings

The key finding of the paper is that the adoption of digital technologies in the banking industry has led to a significant increase in digital fraudulent activities, particularly in the form of online banking frauds. This paper emphasizes that these frauds have become a global concern and have evolved into an industry where cybercriminals use sophisticated tools such as phishing attacks, denial-of-service attacks, Trojan horses, malware infections, identity theft and computer viruses.

Research limitations/implications

This study relies solely on a literature review without incorporating primary data or case studies; therefore, it might miss out on the firsthand experiences and perspectives of banks and cybersecurity professionals.

Practical implications

This study emphasizes the need for banks to adopt advanced security measures to safeguard their online banking systems.

Social implications

This study underscores the importance of ongoing training and awareness programs for both bank employees and customers.

Originality/value

This study specifically addresses the adoption of digital technologies in the banking industry and its correlation with the increase in digital fraudulent activities. This focus on the intersection of technology and fraud in the banking sector is a distinctive aspect. This study conducts a SLR to examine the current technologies implemented by banks to safeguard their online banking systems. This comprehensive approach provides insights into the diverse security measures used by banks to protect against various types of cyber threats.

Details

Journal of Financial Crime, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1359-0790

Keywords

Article
Publication date: 28 February 2023

Tulsi Pawan Fowdur, M.A.N. Shaikh Abdoolla and Lokeshwar Doobur

The purpose of this paper is to perform a comparative analysis of the delay associated in running two real-time machine learning-based applications, namely, a video quality…

Abstract

Purpose

The purpose of this paper is to perform a comparative analysis of the delay associated in running two real-time machine learning-based applications, namely, a video quality assessment (VQA) and a phishing detection application by using the edge, fog and cloud computing paradigms.

Design/methodology/approach

The VQA algorithm was developed using Android Studio and run on a mobile phone for the edge paradigm. For the fog paradigm, it was hosted on a Java server and for the cloud paradigm on the IBM and Firebase clouds. The phishing detection algorithm was embedded into a browser extension for the edge paradigm. For the fog paradigm, it was hosted on a Node.js server and for the cloud paradigm on Firebase.

Findings

For the VQA algorithm, the edge paradigm had the highest response time while the cloud paradigm had the lowest, as the algorithm was computationally intensive. For the phishing detection algorithm, the edge paradigm had the lowest response time, and the cloud paradigm had the highest, as the algorithm had a low computational complexity. Since the determining factor for the response time was the latency, the edge paradigm provided the smallest delay as all processing were local.

Research limitations/implications

The main limitation of this work is that the experiments were performed on a small scale due to time and budget constraints.

Originality/value

A detailed analysis with real applications has been provided to show how the complexity of an application can determine the best computing paradigm on which it can be deployed.

Details

International Journal of Pervasive Computing and Communications, vol. 20 no. 1
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 14 August 2023

Theodoros Millidonis, Petros Lois, Ifigenia Georgiou and Evangelos Tsoukatos

In this paper, the authors review the extant literature on e-learning effectiveness in higher education (HE) to investigate how teachers are affected by the actions that the…

Abstract

Purpose

In this paper, the authors review the extant literature on e-learning effectiveness in higher education (HE) to investigate how teachers are affected by the actions that the management of higher education institutions (HEIs) need to take to address the success factors that are critical for e-learning effectiveness. E-learning, in the context of this study, encompasses the delivery of and access to a coordinated collection of learning materials and instructions over an electronic medium using a web server to provide the materials and a web browser to access them.

Design/methodology/approach

To address the study's aims the authors employ a narrative literature review methodology. Since the area under review is comprehensive and it entails the examination of several topics, the authors have selected this methodology to ensure thorough coverage, and a narrative literature review approach can provide the required degree of thoroughness as it covers a wide range of topics within the thematic area under review. The authors focus on contemporary scientific studies published between January 2017 and May 2022 on how teachers involved in e-learning are affected by management actions taken to achieve success factors for e-learning effectiveness within the HE sector, after identifying and grouping the success factors identified in prior literature into dimensions that reinforce effectiveness.

Findings

The authors of the present study have identified and outlined the most prevalent success factor dimensions by performing a narrative review of the extant literature on the topics of e-learning effectiveness and success factors, and by grouping the various success factors identified into the overarching dimensions presented. These dimensions must also be examined in terms of their relevant importance to the most significant e-learning stakeholder groups. Prior studies have made attempts to obtain relevant stakeholder views on success factors for e-learning, with the student perspective naturally being the most widely covered point of view in terms of e-learning success factors prioritization. More studies are needed that tackle the teachers' perspective as well, since this would enable researchers to determine how teachers view e-learning effectiveness success factors.

Originality/value

The authors also discover that the main success factors in literature are not discussed nearly enough from teachers' perspectives. The authors, therefore, highlight the importance of addressing teachers' perspectives, mainly because this will reinforce teacher acceptance of the e-learning system adopted by an HEI, and the authors also outline future research avenues through which the perception of teachers could be obtained. The authors have identified the technique of knowledge management as a potential method to involve teachers in the decision-making process concerning the management of e-learning more, by taking their views into account and documenting them. The authors have discerned that teachers' acceptance of e-learning would be reinforced by supportive management actions since as a result, teachers see improvements in their technological literacy and pedagogical skills, and this would bring about increased motivation, satisfaction and acceptance of e-learning systems.

Details

International Journal of Educational Management, vol. 37 no. 6/7
Type: Research Article
ISSN: 0951-354X

Keywords

Article
Publication date: 29 March 2024

Sihao Li, Jiali Wang and Zhao Xu

The compliance checking of Building Information Modeling (BIM) models is crucial throughout the lifecycle of construction. The increasing amount and complexity of information…

Abstract

Purpose

The compliance checking of Building Information Modeling (BIM) models is crucial throughout the lifecycle of construction. The increasing amount and complexity of information carried by BIM models have made compliance checking more challenging, and manual methods are prone to errors. Therefore, this study aims to propose an integrative conceptual framework for automated compliance checking of BIM models, allowing for the identification of errors within BIM models.

Design/methodology/approach

This study first analyzed the typical building standards in the field of architecture and fire protection, and then the ontology of these elements is developed. Based on this, a building standard corpus is built, and deep learning models are trained to automatically label the building standard texts. The Neo4j is utilized for knowledge graph construction and storage, and a data extraction method based on the Dynamo is designed to obtain checking data files. After that, a matching algorithm is devised to express the logical rules of knowledge graph triples, resulting in automated compliance checking for BIM models.

Findings

Case validation results showed that this theoretical framework can achieve the automatic construction of domain knowledge graphs and automatic checking of BIM model compliance. Compared with traditional methods, this method has a higher degree of automation and portability.

Originality/value

This study introduces knowledge graphs and natural language processing technology into the field of BIM model checking and completes the automated process of constructing domain knowledge graphs and checking BIM model data. The validation of its functionality and usability through two case studies on a self-developed BIM checking platform.

Details

Engineering, Construction and Architectural Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0969-9988

Keywords

Article
Publication date: 30 June 2022

Amer A. Hijazi, Srinath Perera, Rodrigo N. Calheiros and Ali Alashwal

Despite a large amount of BIM data at the handover stage, it is still difficult to identify and effectively isolate valuable construction supply chain (CSC) data that need to be…

Abstract

Purpose

Despite a large amount of BIM data at the handover stage, it is still difficult to identify and effectively isolate valuable construction supply chain (CSC) data that need to be reliably handed over for operation. Moreover, the role of reconciling disparate data is usually played by one party. The integration of blockchain and BIM is a plausible framework for building a reliable digital asset lifecycle. This paper proposes a BIM single source of truth (BIMSSoT) data model using blockchain for ensuring a reliable CSC data delivery.

Design/methodology/approach

This paper utilises a blended methodology, the foundation of which is ingrained in business and management research with elements of information and communication technology (ICT) research wherever required. Knowledge elicitation case studies utilising novel interventions such as a data flow diagram (DFD), taxonomy and entity-relationship diagram (ERD) were used in this paper to develop the BIMSSoT data model. The model was validated using an expert forum, and its technological feasibility was established by developing a proof of concept.

Findings

The practical contribution of this research leads to the progression of BIM towards digital engineering to go beyond object-based 3D modelling by building structured and reliable datasets, transitioning from project-centric records to a digital ecosystem of linked databases by utilizing blockchain's potential for ensuring trusted data.

Originality/value

To the best of the author's knowledge, prior to this paper, no research had investigated a detailed data model development leveraging blockchain and BIM to integrate an immutable and complete record of CSC data as another dimension of BIM for operations.

Details

Engineering, Construction and Architectural Management, vol. 30 no. 10
Type: Research Article
ISSN: 0969-9988

Keywords

Article
Publication date: 26 January 2022

Deden Sumirat Hidayat, Winaring Suryo Satuti, Dana Indra Sensuse, Damayanti Elisabeth and Lintang Matahari Hasani

Fish quarantine is a measure to prevent the entry and spread of quarantine fish pests and diseases abroad and from one area to another within Indonesia's territory. Based on these…

254

Abstract

Purpose

Fish quarantine is a measure to prevent the entry and spread of quarantine fish pests and diseases abroad and from one area to another within Indonesia's territory. Based on these backgrounds, this study aims to identify the knowledge, knowledge management (KM) processes and knowledge management system (KMS) priority needs for quarantine fish and other fishery products measures (QMFFP) and then develop a classification model and web-based decision support system (DSS) for QMFFP decisions.

Design/methodology/approach

This research methodology uses combination approaches, namely, contingency factor analysis (CFA), the cross-industry standard process for data mining (CRISP-DM) and knowledge management system development life cycle (KMSDLC). The CFA for KM solution design is performed by identifying KM processes and KMS priorities. The CRISP-DM for decision classification model is done by using a decision tree algorithm. The KMSDLC is used to develop a web-based DSS.

Findings

The highest priority requirements of KM technology for QMFFP are data mining and DSS with predictive features. The main finding of this study is to show that web-based DSS (functions and outputs) can support and accelerate QMFFP decisions by regulations and field practice needs. The DSS was developed using the CTree algorithm model, which has six main attributes and eight rules.

Originality/value

This study proposes a novel comprehensive framework for developing DSS (combination of CFA, CRISP-DM and KMSDLC), a novel classification model resulting from comparing two decision tree algorithms and a novel web-based DSS for QMFFP.

Details

VINE Journal of Information and Knowledge Management Systems, vol. 54 no. 2
Type: Research Article
ISSN: 2059-5891

Keywords

Book part
Publication date: 25 October 2023

Ali Katouzian Bolourforoush and Hamid Jahankhani

Banking traces back to 2000 BC in Assyria, India and Sumeria. Merchants used to give grain loans to farmers and traders to carry goods between cities. In ancient Greece and Roman…

Abstract

Banking traces back to 2000 BC in Assyria, India and Sumeria. Merchants used to give grain loans to farmers and traders to carry goods between cities. In ancient Greece and Roman Empire, lenders in temples, provided loans, and accepted deposits while performed change of money. The archaeological evidence uncovered in India and China corroborates this. The major development in banking came predominantly in the mediaeval, Renaissance Italy, with the major cities Florence, Venice and Genoa being the financial centres. Technology has become an inherent and integral part of our lives. We are generating a huge amount of data in transfer, storage and usage, with greater demands of ubiquitous accessibility, inducing an enormous impact on industry and society. With the emergence of smarter cities and societies, the security challenges pertinent to data become greater, impending impact on the consumer protection and security. The aim of this chapter is to highlight if SSI and passwordless authentication using FIDO-2 protocol assuage security concerns such as authentication and authorisation while preserving the individual's privacy.

Details

Technology and Talent Strategies for Sustainable Smart Cities
Type: Book
ISBN: 978-1-83753-023-6

Keywords

Article
Publication date: 26 January 2024

Merly Thomas and Meshram B.B.

Denial-of-service (DoS) attacks develop unauthorized entry to various network services and user information by building traffic that creates multiple requests simultaneously…

Abstract

Purpose

Denial-of-service (DoS) attacks develop unauthorized entry to various network services and user information by building traffic that creates multiple requests simultaneously making the system unavailable to users. Protection of internet services requires effective DoS attack detection to keep an eye on traffic passing across protected networks, freeing the protected internet servers from surveillance threats and ensuring they can focus on offering high-quality services with the fewest response times possible.

Design/methodology/approach

This paper aims to develop a hybrid optimization-based deep learning model to precisely detect DoS attacks.

Findings

The designed Aquila deer hunting optimization-enabled deep belief network technique achieved improved performance with an accuracy of 92.8%, a true positive rate of 92.8% and a true negative rate of 93.6.

Originality/value

The introduced detection approach effectively detects DoS attacks available on the internet.

Details

International Journal of Web Information Systems, vol. 20 no. 1
Type: Research Article
ISSN: 1744-0084

Keywords

1 – 10 of 325