Search results

1 – 10 of 56
Article
Publication date: 22 December 2023

Vaclav Snasel, Tran Khanh Dang, Josef Kueng and Lingping Kong

This paper aims to review in-memory computing (IMC) for machine learning (ML) applications from history, architectures and options aspects. In this review, the authors investigate…

82

Abstract

Purpose

This paper aims to review in-memory computing (IMC) for machine learning (ML) applications from history, architectures and options aspects. In this review, the authors investigate different architectural aspects and collect and provide our comparative evaluations.

Design/methodology/approach

Collecting over 40 IMC papers related to hardware design and optimization techniques of recent years, then classify them into three optimization option categories: optimization through graphic processing unit (GPU), optimization through reduced precision and optimization through hardware accelerator. Then, the authors brief those techniques in aspects such as what kind of data set it applied, how it is designed and what is the contribution of this design.

Findings

ML algorithms are potent tools accommodated on IMC architecture. Although general-purpose hardware (central processing units and GPUs) can supply explicit solutions, their energy efficiencies have limitations because of their excessive flexibility support. On the other hand, hardware accelerators (field programmable gate arrays and application-specific integrated circuits) win on the energy efficiency aspect, but individual accelerator often adapts exclusively to ax single ML approach (family). From a long hardware evolution perspective, hardware/software collaboration heterogeneity design from hybrid platforms is an option for the researcher.

Originality/value

IMC’s optimization enables high-speed processing, increases performance and analyzes massive volumes of data in real-time. This work reviews IMC and its evolution. Then, the authors categorize three optimization paths for the IMC architecture to improve performance metrics.

Details

International Journal of Web Information Systems, vol. 20 no. 1
Type: Research Article
ISSN: 1744-0084

Keywords

Open Access
Article
Publication date: 5 October 2023

Peter Dornheim and Ruediger Zarnekow

The human factor is the most important defense asset against cyberattacks. To ensure that the human factor stays strong, a cybersecurity culture must be established and cultivated…

1033

Abstract

Purpose

The human factor is the most important defense asset against cyberattacks. To ensure that the human factor stays strong, a cybersecurity culture must be established and cultivated in a company to guide the attitudes and behaviors of employees. Many cybersecurity culture frameworks exist; however, their practical application is difficult. This paper aims to demonstrate how an established framework can be applied to determine and improve the cybersecurity culture of a company.

Design/methodology/approach

Two surveys were conducted within eight months in the internal IT department of a global software company to analyze the cybersecurity culture and the applied improvement measures. Both surveys comprised the same 23 questions to measure cybersecurity culture according to six dimensions: cybersecurity accountability, cybersecurity commitment, cybersecurity necessity and importance, cybersecurity policy effectiveness, information usage perception and management buy-in.

Findings

Results demonstrate that cybersecurity culture maturity can be determined and improved if accurate measures are derived from the results of the survey. The first survey showed potential for improving the dimensions of cybersecurity accountability, cybersecurity commitment and cybersecurity policy effectiveness, while the second survey proved that these dimensions have been improved.

Originality/value

This paper proves that practical application of cybersecurity culture frameworks is possible if they are appropriately tailored to a given organization. In this regard, scientific research and practical application combine to offer real value to researchers and cybersecurity executives.

Details

Information & Computer Security, vol. 32 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 2 February 2023

Min Zuo, Jiangnan Qiu and Jingxian Wang

Online collaboration in today's world is a topic of genuine interest to Internet researchers. The purpose of this paper is to explore the role of group knowledge heterogeneity…

Abstract

Purpose

Online collaboration in today's world is a topic of genuine interest to Internet researchers. The purpose of this paper is to explore the role of group knowledge heterogeneity (GKH) in open collaboration performance using the mediating mechanisms of group cognition (GC) and interaction to understand the determinants of the success of online open collaboration platforms.

Design/methodology/approach

Study findings are based on partial least squares structural equation modeling (PLS-SEM), the formal mediation test and moderating effect analysis from Wikipedia's 160 online open collaborative groups.

Findings

For online knowledge heterogeneous groups, open collaboration performance is mediated by both GC and collaborative interaction (COL). The mediating role of GC is weak, while the mediating role of COL is strengthened when knowledge complexity (KC) is higher. By dividing group interaction into COL and communicative interaction (COM), the authors also observed that COL is effective for online open collaboration, whereas COM is limited.

Originality/value

These findings suggest that for more heterogeneous large groups, group interaction would explain more variance in performance than GC, offering an in-depth understanding of the relationship between group heterogeneity and open collaboration performance, answering what determines the success of online open collaboration platforms as well as explaining the inconsistency in prior findings. In addition, this study expands the application of Interactive Team Cognition (ITC) theory to the online open collaboration context.

Article
Publication date: 12 December 2023

Robert Bogue

The purpose of this paper is to provide a detailed insight into the global military robot industry with an emphasis on products and their applications.

Abstract

Purpose

The purpose of this paper is to provide a detailed insight into the global military robot industry with an emphasis on products and their applications.

Design/methodology/approach

Following an introduction which includes a brief historical account, this provides an industry overview, including various market dimensions and a discussion of the geopolitical and technological factors driving market development. The three following sections provide details of land, airborne and marine robots, their capabilities and deployments in recent conflicts. Finally, brief conclusions are drawn.

Findings

Military robots which operate on land, in the air and at sea constitute a multi-billion dollar industry which is growing rapidly. It is being driven by geopolitical tensions, notably the military-technology arms race between China and the USA and the conflict in Ukraine, together with technological progress, particularly in AI. Many robots possess multi-functional capabilities, and the leading application is presently intelligence, surveillance and reconnaissance. An increasing number of heavily armed robots are being developed, and AI has the potential to impart these with the capacity to deliver lethal force without human intervention. Although heavily criticised in some quarters, this capability has probably already been deployed on the battlefield. With ever-growing military budgets, escalating political tensions and technological innovations, robots will play an increasingly significant role in future conflicts.

Originality/value

This provides a detail account of military robots and their role in modern warfare.

Details

Industrial Robot: the international journal of robotics research and application, vol. 51 no. 2
Type: Research Article
ISSN: 0143-991X

Keywords

Article
Publication date: 6 July 2023

Fayaz Ahmad Loan, Aasif Mohammad Khan, Syed Aasif Ahmad Andrabi, Sozia Rashid Sozia and Umer Yousuf Parray

The purpose of the present study is to identify the active and dead links of uniform resource locators (URLs) associated with web references and to compare the effectiveness of…

Abstract

Purpose

The purpose of the present study is to identify the active and dead links of uniform resource locators (URLs) associated with web references and to compare the effectiveness of Chrome, Google and WayBack Machine in retrieving the dead URLs.

Design/methodology/approach

The web references of the Library Hi Tech from 2004 to 2008 were selected for analysis to fulfill the set objectives. The URLs were extracted from the articles to verify their accessibility in terms of persistence and decay. The URLs were then executed directly in the internet browser (Chrome), search engine (Google) and Internet Archive (WayBack Machine). The collected data were recorded in an excel file and presented in tables/diagrams for further analysis.

Findings

From the total of 1,083 web references, a maximum number was retrieved by the WayBack Machine (786; 72.6 per cent) followed by Google (501; 46.3 per cent) and the lowest by Chrome (402; 37.1 per cent). The study concludes that the WayBack Machine is more efficient, retrieves a maximum number of missing web citations and fulfills the mission of preservation of web sources to a larger extent.

Originality/value

A good number of studies have been conducted to analyze the persistence and decay of web-references; however, the present study is unique as it compared the dead URL retrieval effectiveness of internet explorer (Chrome), search engine giant (Google) and WayBack Machine of the Internet Archive.

Research limitations/implications

The web references of a single journal, namely, Library Hi Tech, were analyzed for 5 years only. A major study across disciplines and sources may yield better results.

Practical implications

URL decay is becoming a major problem in the preservation and citation of web resources. The study has some healthy recommendations for authors, editors, publishers, librarians and web designers to improve the persistence of web references.

Details

Data Technologies and Applications, vol. 58 no. 2
Type: Research Article
ISSN: 2514-9288

Keywords

Article
Publication date: 15 March 2024

Florian Rupp, Benjamin Schnabel and Kai Eckert

The purpose of this work is to explore the new possibilities enabled by the recent introduction of RDF-star, an extension that allows for statements about statements within the…

Abstract

Purpose

The purpose of this work is to explore the new possibilities enabled by the recent introduction of RDF-star, an extension that allows for statements about statements within the Resource Description Framework (RDF). Alongside Named Graphs, this approach offers opportunities to leverage a meta-level for data modeling and data applications.

Design/methodology/approach

In this extended paper, the authors build onto three modeling use cases published in a previous paper: (1) provide provenance information, (2) maintain backwards compatibility for existing models, and (3) reduce the complexity of a data model. The authors present two scenarios where they implement the use of the meta-level to extend a data model with meta-information.

Findings

The authors present three abstract patterns for actively using the meta-level in data modeling. The authors showcase the implementation of the meta-level through two scenarios from our research project: (1) the authors introduce a workflow for triple annotation that uses the meta-level to enable users to comment on individual statements, such as for reporting errors or adding supplementary information. (2) The authors demonstrate how adding meta-information to a data model can accommodate highly specialized data while maintaining the simplicity of the underlying model.

Practical implications

Through the formulation of data modeling patterns with RDF-star and the demonstration of their application in two scenarios, the authors advocate for data modelers to embrace the meta-level.

Originality/value

With RDF-star being a very new extension to RDF, to the best of the authors’ knowledge, they are among the first to relate it to other meta-level approaches and demonstrate its application in real-world scenarios.

Details

The Electronic Library , vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0264-0473

Keywords

Article
Publication date: 17 February 2023

Jiangnan Qiu, Wenjing Gu, Zhongming Ma, Yue You, Chengjie Cai and Meihui Zhang

In the extant research on online knowledge communities (OKCs), little attention has been paid to the influence of membership fluidity on the coevolution of the social and…

Abstract

Purpose

In the extant research on online knowledge communities (OKCs), little attention has been paid to the influence of membership fluidity on the coevolution of the social and knowledge systems. This article aims to fill this gap.

Design/methodology/approach

Based on the attraction-selection-attrition (ASA) framework, this paper constructs a simulation model to study the coevolution of these two systems under different levels of membership fluidity.

Findings

By analyzing the evolution of these systems with the vector autoregression (VAR) method, we find that social and knowledge systems become more orderly as the coevolution progresses. Furthermore, in communities with low membership fluidity, the microlevel of the social system (i.e. users) drives the coevolution, whereas in communities with high membership fluidity, the microlevel of the knowledge system (i.e. users' views) drives the coevolution.

Originality/value

This paper extends the application of the ASA framework and enriches the literature on membership fluidity of online communities and the literature on driving factors for coevolution of the social and knowledge systems in OKCs. On a practical level, our work suggests that community administrators should adopt different strategies for different membership fluidity to efficiently promote the coevolution of the social and knowledge systems in OKCs.

Details

Information Technology & People, vol. 37 no. 2
Type: Research Article
ISSN: 0959-3845

Keywords

Open Access
Article
Publication date: 5 April 2024

Miquel Centelles and Núria Ferran-Ferrer

Develop a comprehensive framework for assessing the knowledge organization systems (KOSs), including the taxonomy of Wikipedia and the ontologies of Wikidata, with a specific…

Abstract

Purpose

Develop a comprehensive framework for assessing the knowledge organization systems (KOSs), including the taxonomy of Wikipedia and the ontologies of Wikidata, with a specific focus on enhancing management and retrieval with a gender nonbinary perspective.

Design/methodology/approach

This study employs heuristic and inspection methods to assess Wikipedia’s KOS, ensuring compliance with international standards. It evaluates the efficiency of retrieving non-masculine gender-related articles using the Catalan Wikipedian category scheme, identifying limitations. Additionally, a novel assessment of Wikidata ontologies examines their structure and coverage of gender-related properties, comparing them to Wikipedia’s taxonomy for advantages and enhancements.

Findings

This study evaluates Wikipedia’s taxonomy and Wikidata’s ontologies, establishing evaluation criteria for gender-based categorization and exploring their structural effectiveness. The evaluation process suggests that Wikidata ontologies may offer a viable solution to address Wikipedia’s categorization challenges.

Originality/value

The assessment of Wikipedia categories (taxonomy) based on KOS standards leads to the conclusion that there is ample room for improvement, not only in matters concerning gender identity but also in the overall KOS to enhance search and retrieval for users. These findings bear relevance for the design of tools to support information retrieval on knowledge-rich websites, as they assist users in exploring topics and concepts.

Article
Publication date: 1 December 2023

Romildo Silva, Rui Pedro Marques and Helena Inácio

The purpose of this study is to identify the possible efficiency gains in using tokenization for the execution of public expenditure on governmental investments.

Abstract

Purpose

The purpose of this study is to identify the possible efficiency gains in using tokenization for the execution of public expenditure on governmental investments.

Design/methodology/approach

Through design science research methodology, the exploratory research produced a tokenized prototype in the blockchain, through the Ernst and Young OpsChain traceability solution, allowing automated processes in the stages of public expense. A focus group composed of auditors from the public sector evaluated the possibility of improving the quality of information available in the audited entities, where the tokens created represent and register the actions of public agents in the blockchain Polygon.

Findings

The consensus of the experts in the focus group indicated that the use of tokenization could improve the quality of the information, since the possibility of recording the activities of public agents in the metadata of the tokens at each stage of the execution of the expenditure allows the audited entities the advantages of the information recorded on the blockchain, according to the following ranking: first the immutability of audited data, followed by reliability, transparency, accessibility and efficiency of data structures.

Originality/value

This research makes an empirical contribution to the real use of tokenization in blockchain technology to the public sector through a value chain in which tokens were created and moved between the wallets of public agents to represent, register and track the operations regarding public expense execution.

Details

International Journal of Accounting & Information Management, vol. 32 no. 1
Type: Research Article
ISSN: 1834-7649

Keywords

Article
Publication date: 25 May 2023

Abhiyan Upadhyay

The purpose of this paper is to understand the financial opaqueness established through offshore businesses and financial secrecy through the requirements of information…

Abstract

Purpose

The purpose of this paper is to understand the financial opaqueness established through offshore businesses and financial secrecy through the requirements of information exchanges, and their deadly combination for facilitating money-laundering activities and tax evasion. It also puts into light some key recommendations for a country like Nepal that has been struggling to put adequate efforts into understanding financial opacity and secrecy.

Design/methodology/approach

This paper navigates through global issues on layering through opaque corporate structures, and mechanisms required for information exchange so as to figure out solutions and challenges to address them by developing countries like Nepal, with specific actions pertaining to Nepal.

Findings

Understanding financial opacity and secrecy is a prerequisite to tackling financial crimes. While focusing on global solutions and inherent challenges regarding such issues, concerted efforts are required to capacitate a country on contextual matters.

Originality/value

This work is an original work with an analysis of a global issue in an interconnected world with solutions catered to the local contexts of Nepal.

1 – 10 of 56