Search results
1 – 10 of 56Vaclav Snasel, Tran Khanh Dang, Josef Kueng and Lingping Kong
This paper aims to review in-memory computing (IMC) for machine learning (ML) applications from history, architectures and options aspects. In this review, the authors investigate…
Abstract
Purpose
This paper aims to review in-memory computing (IMC) for machine learning (ML) applications from history, architectures and options aspects. In this review, the authors investigate different architectural aspects and collect and provide our comparative evaluations.
Design/methodology/approach
Collecting over 40 IMC papers related to hardware design and optimization techniques of recent years, then classify them into three optimization option categories: optimization through graphic processing unit (GPU), optimization through reduced precision and optimization through hardware accelerator. Then, the authors brief those techniques in aspects such as what kind of data set it applied, how it is designed and what is the contribution of this design.
Findings
ML algorithms are potent tools accommodated on IMC architecture. Although general-purpose hardware (central processing units and GPUs) can supply explicit solutions, their energy efficiencies have limitations because of their excessive flexibility support. On the other hand, hardware accelerators (field programmable gate arrays and application-specific integrated circuits) win on the energy efficiency aspect, but individual accelerator often adapts exclusively to ax single ML approach (family). From a long hardware evolution perspective, hardware/software collaboration heterogeneity design from hybrid platforms is an option for the researcher.
Originality/value
IMC’s optimization enables high-speed processing, increases performance and analyzes massive volumes of data in real-time. This work reviews IMC and its evolution. Then, the authors categorize three optimization paths for the IMC architecture to improve performance metrics.
Details
Keywords
Peter Dornheim and Ruediger Zarnekow
The human factor is the most important defense asset against cyberattacks. To ensure that the human factor stays strong, a cybersecurity culture must be established and cultivated…
Abstract
Purpose
The human factor is the most important defense asset against cyberattacks. To ensure that the human factor stays strong, a cybersecurity culture must be established and cultivated in a company to guide the attitudes and behaviors of employees. Many cybersecurity culture frameworks exist; however, their practical application is difficult. This paper aims to demonstrate how an established framework can be applied to determine and improve the cybersecurity culture of a company.
Design/methodology/approach
Two surveys were conducted within eight months in the internal IT department of a global software company to analyze the cybersecurity culture and the applied improvement measures. Both surveys comprised the same 23 questions to measure cybersecurity culture according to six dimensions: cybersecurity accountability, cybersecurity commitment, cybersecurity necessity and importance, cybersecurity policy effectiveness, information usage perception and management buy-in.
Findings
Results demonstrate that cybersecurity culture maturity can be determined and improved if accurate measures are derived from the results of the survey. The first survey showed potential for improving the dimensions of cybersecurity accountability, cybersecurity commitment and cybersecurity policy effectiveness, while the second survey proved that these dimensions have been improved.
Originality/value
This paper proves that practical application of cybersecurity culture frameworks is possible if they are appropriately tailored to a given organization. In this regard, scientific research and practical application combine to offer real value to researchers and cybersecurity executives.
Details
Keywords
Min Zuo, Jiangnan Qiu and Jingxian Wang
Online collaboration in today's world is a topic of genuine interest to Internet researchers. The purpose of this paper is to explore the role of group knowledge heterogeneity…
Abstract
Purpose
Online collaboration in today's world is a topic of genuine interest to Internet researchers. The purpose of this paper is to explore the role of group knowledge heterogeneity (GKH) in open collaboration performance using the mediating mechanisms of group cognition (GC) and interaction to understand the determinants of the success of online open collaboration platforms.
Design/methodology/approach
Study findings are based on partial least squares structural equation modeling (PLS-SEM), the formal mediation test and moderating effect analysis from Wikipedia's 160 online open collaborative groups.
Findings
For online knowledge heterogeneous groups, open collaboration performance is mediated by both GC and collaborative interaction (COL). The mediating role of GC is weak, while the mediating role of COL is strengthened when knowledge complexity (KC) is higher. By dividing group interaction into COL and communicative interaction (COM), the authors also observed that COL is effective for online open collaboration, whereas COM is limited.
Originality/value
These findings suggest that for more heterogeneous large groups, group interaction would explain more variance in performance than GC, offering an in-depth understanding of the relationship between group heterogeneity and open collaboration performance, answering what determines the success of online open collaboration platforms as well as explaining the inconsistency in prior findings. In addition, this study expands the application of Interactive Team Cognition (ITC) theory to the online open collaboration context.
Details
Keywords
The purpose of this paper is to provide a detailed insight into the global military robot industry with an emphasis on products and their applications.
Abstract
Purpose
The purpose of this paper is to provide a detailed insight into the global military robot industry with an emphasis on products and their applications.
Design/methodology/approach
Following an introduction which includes a brief historical account, this provides an industry overview, including various market dimensions and a discussion of the geopolitical and technological factors driving market development. The three following sections provide details of land, airborne and marine robots, their capabilities and deployments in recent conflicts. Finally, brief conclusions are drawn.
Findings
Military robots which operate on land, in the air and at sea constitute a multi-billion dollar industry which is growing rapidly. It is being driven by geopolitical tensions, notably the military-technology arms race between China and the USA and the conflict in Ukraine, together with technological progress, particularly in AI. Many robots possess multi-functional capabilities, and the leading application is presently intelligence, surveillance and reconnaissance. An increasing number of heavily armed robots are being developed, and AI has the potential to impart these with the capacity to deliver lethal force without human intervention. Although heavily criticised in some quarters, this capability has probably already been deployed on the battlefield. With ever-growing military budgets, escalating political tensions and technological innovations, robots will play an increasingly significant role in future conflicts.
Originality/value
This provides a detail account of military robots and their role in modern warfare.
Details
Keywords
Fayaz Ahmad Loan, Aasif Mohammad Khan, Syed Aasif Ahmad Andrabi, Sozia Rashid Sozia and Umer Yousuf Parray
The purpose of the present study is to identify the active and dead links of uniform resource locators (URLs) associated with web references and to compare the effectiveness of…
Abstract
Purpose
The purpose of the present study is to identify the active and dead links of uniform resource locators (URLs) associated with web references and to compare the effectiveness of Chrome, Google and WayBack Machine in retrieving the dead URLs.
Design/methodology/approach
The web references of the Library Hi Tech from 2004 to 2008 were selected for analysis to fulfill the set objectives. The URLs were extracted from the articles to verify their accessibility in terms of persistence and decay. The URLs were then executed directly in the internet browser (Chrome), search engine (Google) and Internet Archive (WayBack Machine). The collected data were recorded in an excel file and presented in tables/diagrams for further analysis.
Findings
From the total of 1,083 web references, a maximum number was retrieved by the WayBack Machine (786; 72.6 per cent) followed by Google (501; 46.3 per cent) and the lowest by Chrome (402; 37.1 per cent). The study concludes that the WayBack Machine is more efficient, retrieves a maximum number of missing web citations and fulfills the mission of preservation of web sources to a larger extent.
Originality/value
A good number of studies have been conducted to analyze the persistence and decay of web-references; however, the present study is unique as it compared the dead URL retrieval effectiveness of internet explorer (Chrome), search engine giant (Google) and WayBack Machine of the Internet Archive.
Research limitations/implications
The web references of a single journal, namely, Library Hi Tech, were analyzed for 5 years only. A major study across disciplines and sources may yield better results.
Practical implications
URL decay is becoming a major problem in the preservation and citation of web resources. The study has some healthy recommendations for authors, editors, publishers, librarians and web designers to improve the persistence of web references.
Details
Keywords
Florian Rupp, Benjamin Schnabel and Kai Eckert
The purpose of this work is to explore the new possibilities enabled by the recent introduction of RDF-star, an extension that allows for statements about statements within the…
Abstract
Purpose
The purpose of this work is to explore the new possibilities enabled by the recent introduction of RDF-star, an extension that allows for statements about statements within the Resource Description Framework (RDF). Alongside Named Graphs, this approach offers opportunities to leverage a meta-level for data modeling and data applications.
Design/methodology/approach
In this extended paper, the authors build onto three modeling use cases published in a previous paper: (1) provide provenance information, (2) maintain backwards compatibility for existing models, and (3) reduce the complexity of a data model. The authors present two scenarios where they implement the use of the meta-level to extend a data model with meta-information.
Findings
The authors present three abstract patterns for actively using the meta-level in data modeling. The authors showcase the implementation of the meta-level through two scenarios from our research project: (1) the authors introduce a workflow for triple annotation that uses the meta-level to enable users to comment on individual statements, such as for reporting errors or adding supplementary information. (2) The authors demonstrate how adding meta-information to a data model can accommodate highly specialized data while maintaining the simplicity of the underlying model.
Practical implications
Through the formulation of data modeling patterns with RDF-star and the demonstration of their application in two scenarios, the authors advocate for data modelers to embrace the meta-level.
Originality/value
With RDF-star being a very new extension to RDF, to the best of the authors’ knowledge, they are among the first to relate it to other meta-level approaches and demonstrate its application in real-world scenarios.
Details
Keywords
Jiangnan Qiu, Wenjing Gu, Zhongming Ma, Yue You, Chengjie Cai and Meihui Zhang
In the extant research on online knowledge communities (OKCs), little attention has been paid to the influence of membership fluidity on the coevolution of the social and…
Abstract
Purpose
In the extant research on online knowledge communities (OKCs), little attention has been paid to the influence of membership fluidity on the coevolution of the social and knowledge systems. This article aims to fill this gap.
Design/methodology/approach
Based on the attraction-selection-attrition (ASA) framework, this paper constructs a simulation model to study the coevolution of these two systems under different levels of membership fluidity.
Findings
By analyzing the evolution of these systems with the vector autoregression (VAR) method, we find that social and knowledge systems become more orderly as the coevolution progresses. Furthermore, in communities with low membership fluidity, the microlevel of the social system (i.e. users) drives the coevolution, whereas in communities with high membership fluidity, the microlevel of the knowledge system (i.e. users' views) drives the coevolution.
Originality/value
This paper extends the application of the ASA framework and enriches the literature on membership fluidity of online communities and the literature on driving factors for coevolution of the social and knowledge systems in OKCs. On a practical level, our work suggests that community administrators should adopt different strategies for different membership fluidity to efficiently promote the coevolution of the social and knowledge systems in OKCs.
Details
Keywords
Miquel Centelles and Núria Ferran-Ferrer
Develop a comprehensive framework for assessing the knowledge organization systems (KOSs), including the taxonomy of Wikipedia and the ontologies of Wikidata, with a specific…
Abstract
Purpose
Develop a comprehensive framework for assessing the knowledge organization systems (KOSs), including the taxonomy of Wikipedia and the ontologies of Wikidata, with a specific focus on enhancing management and retrieval with a gender nonbinary perspective.
Design/methodology/approach
This study employs heuristic and inspection methods to assess Wikipedia’s KOS, ensuring compliance with international standards. It evaluates the efficiency of retrieving non-masculine gender-related articles using the Catalan Wikipedian category scheme, identifying limitations. Additionally, a novel assessment of Wikidata ontologies examines their structure and coverage of gender-related properties, comparing them to Wikipedia’s taxonomy for advantages and enhancements.
Findings
This study evaluates Wikipedia’s taxonomy and Wikidata’s ontologies, establishing evaluation criteria for gender-based categorization and exploring their structural effectiveness. The evaluation process suggests that Wikidata ontologies may offer a viable solution to address Wikipedia’s categorization challenges.
Originality/value
The assessment of Wikipedia categories (taxonomy) based on KOS standards leads to the conclusion that there is ample room for improvement, not only in matters concerning gender identity but also in the overall KOS to enhance search and retrieval for users. These findings bear relevance for the design of tools to support information retrieval on knowledge-rich websites, as they assist users in exploring topics and concepts.
Details
Keywords
Romildo Silva, Rui Pedro Marques and Helena Inácio
The purpose of this study is to identify the possible efficiency gains in using tokenization for the execution of public expenditure on governmental investments.
Abstract
Purpose
The purpose of this study is to identify the possible efficiency gains in using tokenization for the execution of public expenditure on governmental investments.
Design/methodology/approach
Through design science research methodology, the exploratory research produced a tokenized prototype in the blockchain, through the Ernst and Young OpsChain traceability solution, allowing automated processes in the stages of public expense. A focus group composed of auditors from the public sector evaluated the possibility of improving the quality of information available in the audited entities, where the tokens created represent and register the actions of public agents in the blockchain Polygon.
Findings
The consensus of the experts in the focus group indicated that the use of tokenization could improve the quality of the information, since the possibility of recording the activities of public agents in the metadata of the tokens at each stage of the execution of the expenditure allows the audited entities the advantages of the information recorded on the blockchain, according to the following ranking: first the immutability of audited data, followed by reliability, transparency, accessibility and efficiency of data structures.
Originality/value
This research makes an empirical contribution to the real use of tokenization in blockchain technology to the public sector through a value chain in which tokens were created and moved between the wallets of public agents to represent, register and track the operations regarding public expense execution.
Details
Keywords
The purpose of this paper is to understand the financial opaqueness established through offshore businesses and financial secrecy through the requirements of information…
Abstract
Purpose
The purpose of this paper is to understand the financial opaqueness established through offshore businesses and financial secrecy through the requirements of information exchanges, and their deadly combination for facilitating money-laundering activities and tax evasion. It also puts into light some key recommendations for a country like Nepal that has been struggling to put adequate efforts into understanding financial opacity and secrecy.
Design/methodology/approach
This paper navigates through global issues on layering through opaque corporate structures, and mechanisms required for information exchange so as to figure out solutions and challenges to address them by developing countries like Nepal, with specific actions pertaining to Nepal.
Findings
Understanding financial opacity and secrecy is a prerequisite to tackling financial crimes. While focusing on global solutions and inherent challenges regarding such issues, concerted efforts are required to capacitate a country on contextual matters.
Originality/value
This work is an original work with an analysis of a global issue in an interconnected world with solutions catered to the local contexts of Nepal.
Details