Search results

1 – 10 of 215
Open Access
Article
Publication date: 11 December 2023

Eoin Whelan and Ofir Turel

Prior research has extensively examined how bringing technology from work into the non-work life domain creates conflict, yet the reverse pathway has rarely been studied. The…

2860

Abstract

Purpose

Prior research has extensively examined how bringing technology from work into the non-work life domain creates conflict, yet the reverse pathway has rarely been studied. The purpose of this study is to bridge this gap and examine how the non-work use of smartphones in the workplace affects work–life conflict.

Design/methodology/approach

Drawing from three literature streams: technostress, work–life conflict and role boundary theory, the authors theorise on how limiting employees' ability to integrate the personal life domain into work, by means of technology use policy, contributes to stress and work–life conflict. To test this model, the authors employ a natural experiment in a company that changed its policy from fully restricting to open smartphone access for non-work purposes in the workplace. The insights gained from the experiment were explored further through qualitative interviews.

Findings

Work–life conflict declines when a ban on using smartphones for non-work purposes in the workplace is revoked. This study's results show that the relationship between smartphone use in the workplace and work–life conflict is mediated by sensed stress. Additionally, a post-hoc analysis reveals that work performance was unchanged when the smartphone ban was revoked.

Originality/value

First, this study advances the authors' understanding of how smartphone use policies in the workplace spill over to affect non-work life. Second, this work contributes to the technostress literature by revealing how, in specific situations, engagement with ICT can reduce distress and strain.

Details

Internet Research, vol. 34 no. 7
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 2 February 2023

Lai-Wan Wong, Garry Wei-Han Tan, Keng-Boon Ooi and Yogesh Dwivedi

The deployment of artificial intelligence (AI) technologies in travel and tourism has received much attention in the wake of the pandemic. While societal adoption of AI has…

1303

Abstract

Purpose

The deployment of artificial intelligence (AI) technologies in travel and tourism has received much attention in the wake of the pandemic. While societal adoption of AI has accelerated, it also raises some trust challenges. Literature on trust in AI is scant, especially regarding the vulnerabilities faced by different stakeholders to inform policy and practice. This work proposes a framework to understand the use of AI technologies from the perspectives of institutional and the self to understand the formation of trust in the mandated use of AI-based technologies in travelers.

Design/methodology/approach

An empirical investigation using partial least squares-structural equation modeling was employed on responses from 209 users. This paper considered factors related to the self (perceptions of self-threat, privacy empowerment, trust propensity) and institution (regulatory protection, corporate privacy responsibility) to understand the formation of trust in AI use for travelers.

Findings

Results showed that self-threat, trust propensity and regulatory protection influence trust in users on AI use. Privacy empowerment and corporate responsibility do not.

Originality/value

Insights from the past studies on AI in travel and tourism are limited. This study advances current literature on affordance and reactance theories to provide a better understanding of what makes travelers trust the mandated use of AI technologies. This work also demonstrates the paradoxical effects of self and institution on technologies and their relationship to trust. For practice, this study offers insights for enhancing adoption via developing trust.

Details

Internet Research, vol. 34 no. 2
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 22 March 2023

Fayaz Ali, Muhammd Zubair Tauni, Muhammad Ashfaq, Qingyu Zhang and Tanveer Ahsan

Given the limited literature on depression as a contributing factor to compulsive social media use, the present research examines the role of perceived depressive mood (PDM) in…

Abstract

Purpose

Given the limited literature on depression as a contributing factor to compulsive social media use, the present research examines the role of perceived depressive mood (PDM) in developing compulsive social media use behavior. The authors also identify and hypothesize channels such as contingent self-esteem (CSE), social interaction anxiety (SIA) and fear of negative evaluation (FNE), which may explain how PDM affects compulsive social media use.

Design/methodology/approach

The research model was empirically tested with a survey of 367 Chinese university students using structural equation modeling by drawing on the escape and self-presentation lenses.

Findings

The findings indicate that PDM contributes to compulsive social media use behavior both directly and indirectly through CSE. Furthermore, the impact of CSE on compulsive social media use is mediated by the FNE, whereas SIA fails to mediate this effect.

Practical implications

The results can advance the authors’ knowledge of the role and process by which depressive mood impacts compulsive social media use. These findings may add insights into psychological treatment and help in, for example, developing counseling programs or coping strategies for depressed people to protect them from using social media excessively.

Originality/value

This research identifies the pathway mechanism between PDM and compulsive use of social media. It also increases the understanding of how CSE and social interaction deficiencies contribute to compulsive social media usage (CSMU).

Details

Information Technology & People, vol. 37 no. 3
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 29 April 2024

Rui Zhu and Lihong Li

In the context of Industry 4.0, intelligent construction technologies (ICT) represented by information technology and networking will undoubtedly provide new impetus to the…

Abstract

Purpose

In the context of Industry 4.0, intelligent construction technologies (ICT) represented by information technology and networking will undoubtedly provide new impetus to the development of the prefabricated building supply chain (PBSC), but they will also bring various potential risks. So far, there is a large lack of research on the comprehensive consideration of the risks associated with the intelligent transformation of PBSC based on the information sharing perspective, and the critical risks and interactions are still unclear, making it difficult to identify efficient risk mitigation strategies. Therefore, this paper aims to reveal the interactions between stakeholders and clarify the critical risk nodes and interactions in information sharing of PBSC (IS-PBSC), and propose targeted risk mitigation strategies.

Design/methodology/approach

Firstly, this paper creatively delineates the risks and critical stakeholders of IS-PBSC. Secondly, Data is collected through questionnaires to understand the degree of risks impact. Thirdly, with the help of NetMiner 4 software, social network analysis is conducted and IS-PBSC risk network is established to reveal critical risk nodes and interactions. Finally, further targeted discussion of critical risk nodes, the effectiveness and reasonableness of the risk mitigation strategies are proposed and verified through NetMiner 4 software simulation.

Findings

The results show that the critical risks cover the entire process of information sharing, with the lack of information management norms and other information assurance-related risks accounting for the largest proportion. In addition, the government dominates in risk control, followed by other stakeholders. The implementation of risk mitigation strategies is effective, with the overall network density reduced by 41.15% and network cohesion reduced by 24%.

Research limitations/implications

In the context of Industry 4.0, ICT represented by information technology and networking will undoubtedly provide new impetus to the development of the PBSC, but they will also bring various potential risks. So far, there is a large lack of research on the comprehensive consideration of the risks associated with the intelligent transformation of PBSC based on the information sharing perspective, and the critical risks and interactions are still unclear, making it difficult to identify efficient risk mitigation strategies.

Originality/value

Based on the results of risk network visualization analysis, this paper proposes an ICT-based IS-PBSC mechanism that promotes the development of the integration of ICT and PBSC while safeguarding the benefits of various stakeholders.

Details

Kybernetes, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0368-492X

Keywords

Article
Publication date: 15 February 2023

Rufeng Wang, Siqi Wang and Guoqu Deng

The expansion of bike-sharing enterprises has led to a series of social problems, and due to the high breakage rate and high recycling cost of bike sharing, enterprises are…

Abstract

Purpose

The expansion of bike-sharing enterprises has led to a series of social problems, and due to the high breakage rate and high recycling cost of bike sharing, enterprises are reluctant to maintain them. Therefore, government regulation does play a leading role in maintaining bike sharing. This study’s purpose is to investigate how the government should regulate the bike-sharing enterprises that maintain bicycles.

Design/methodology/approach

Firstly, the authors assume that there is only one bike-sharing enterprise and establish a game model that the government regulates the enterprise. Furthermore, the authors extend the model to the case that there are two competing enterprises in the market. Finally, through numerical analysis, the influence of various factors on the government strategy and revenue is analyzed.

Findings

The authors find that the regulatory probability of two enterprises are regulated by the government is larger than that of one enterprise. When two bike-sharing enterprises compete without government regulation, both will choose the non-self-discipline strategy, thus falling into the Prisoner's Dilemma. If the government regulates them, then both enterprises will choose the self-discipline strategy. Finally, through numerical analysis, it is found that the self-discipline behavior of bike-sharing enterprises is related to the government regulatory probability, the cost of self-discipline, the probability of being reported and the penalties. Interestingly, the cost of government regulation will not affect the regulation probability of government.

Practical implications

This research provides a theoretical reference for the government to make the regulation strategies of bike sharing and achieve the sustainable development of bike sharing.

Originality/value

This research provides a theoretical reference for the government to make the regulation strategies of bike sharing and achieve the sustainable development of bike sharing.

Details

Kybernetes, vol. 53 no. 5
Type: Research Article
ISSN: 0368-492X

Keywords

Article
Publication date: 19 May 2022

Priyanka Kumari Bhansali, Dilendra Hiran, Hemant Kothari and Kamal Gulati

The purpose of this paper Computing is a recent emerging cloud model that affords clients limitless facilities, lowers the rate of customer storing and computation and progresses…

Abstract

Purpose

The purpose of this paper Computing is a recent emerging cloud model that affords clients limitless facilities, lowers the rate of customer storing and computation and progresses the ease of use, leading to a surge in the number of enterprises and individuals storing data in the cloud. Cloud services are used by various organizations (education, medical and commercial) to store their data. In the health-care industry, for example, patient medical data is outsourced to a cloud server. Instead of relying onmedical service providers, clients can access theirmedical data over the cloud.

Design/methodology/approach

This section explains the proposed cloud-based health-care system for secure data storage and access control called hash-based ciphertext policy attribute-based encryption with signature (hCP-ABES). It provides access control with finer granularity, security, authentication and user confidentiality of medical data. It enhances ciphertext-policy attribute-based encryption (CP-ABE) with hashing, encryption and signature. The proposed architecture includes protection mechanisms to guarantee that health-care and medical information can be securely exchanged between health systems via the cloud. Figure 2 depicts the proposed work's architectural design.

Findings

For health-care-related applications, safe contact with common documents hosted on a cloud server is becoming increasingly important. However, there are numerous constraints to designing an effective and safe data access method, including cloud server performance, a high number of data users and various security requirements. This work adds hashing and signature to the classic CP-ABE technique. It protects the confidentiality of health-care data while also allowing for fine-grained access control. According to an analysis of security needs, this work fulfills the privacy and integrity of health information using federated learning.

Originality/value

The Internet of Things (IoT) technology and smart diagnostic implants have enhanced health-care systems by allowing for remote access and screening of patients’ health issues at any time and from any location. Medical IoT devices monitor patients’ health status and combine this information into medical records, which are then transferred to the cloud and viewed by health providers for decision-making. However, when it comes to information transfer, the security and secrecy of electronic health records become a major concern. This work offers effective data storage and access control for a smart healthcare system to protect confidentiality. CP-ABE ensures data confidentiality and also allows control on data access at a finer level. Furthermore, it allows owners to set up a dynamic patients health data sharing policy under the cloud layer. hCP-ABES proposed fine-grained data access, security, authentication and user privacy of medical data. This paper enhances CP-ABE with hashing, encryption and signature. The proposed method has been evaluated, and the results signify that the proposed hCP-ABES is feasible compared to other access control schemes using federated learning.

Details

International Journal of Pervasive Computing and Communications, vol. 20 no. 2
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 5 April 2024

Wenwei Huang, Deyu Zhong and Yanlin Chen

Construction enterprises are achieving the goal of production safety by increasingly focusing on the critical factor of “human” and the impact of individual characteristics on…

Abstract

Purpose

Construction enterprises are achieving the goal of production safety by increasingly focusing on the critical factor of “human” and the impact of individual characteristics on safety performance. Emotional intelligence is categorized into three models: skill-based, trait-based and emotional learning systems. However, the mechanism of action and the internal relationship between emotional intelligence and safety performance must be further studied. This study intends to examine the internal mechanism of emotional intelligence on safety performance in construction projects, which would contribute to the safety management of construction enterprises.

Design/methodology/approach

A structural equation model exploring the relationship between emotional intelligence and safety performance is developed, with political skill introduced as an independent dimension, situational awareness presented as a mediator, and management safety commitment introduced as a moderator. Data were collected by a random questionnaire and analyzed by SPSS 24.0 and AMOS 26.0. The structural equation model tested the mediation hypothesis, and the PROCESS macro program tested the moderated mediation hypothesis.

Findings

The results showed that construction workers' emotional intelligence directly correlates with safety performance, and situational awareness plays a mediating role in the relationship between emotional intelligence and the safety performance of construction workers. Management safety commitment weakens the positive predictive relationships between emotional intelligence and situational awareness and between emotional intelligence and safety performance.

Originality/value

This research reveals a possible impact of emotional intelligence on safety performance. Adding political skills to the skill-based model of emotional intelligence received a test pass. Political skill measures the sincere and cooperative skills of construction workers. Using people as a critical element plays a role in the benign mechanism of “Emotional Intelligence – Situational Awareness – Safety Performance.” Improving emotional intelligence skills through training, enhancing situational awareness, understanding, anticipation and coordination and activating management environment factors can improve safety performance. Construction enterprises should evaluate and train workers' emotional intelligence to improve workers' situational awareness and safety performance.

Details

Engineering, Construction and Architectural Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0969-9988

Keywords

Article
Publication date: 15 April 2024

Seyed Abbas Rajaei, Afshin Mottaghi, Hussein Elhaei Sahar and Behnaz Bahadori

This study aims to investigate the spatial distribution of housing prices and identify the affecting factors (independent variable) on the cost of residential units (dependent…

Abstract

Purpose

This study aims to investigate the spatial distribution of housing prices and identify the affecting factors (independent variable) on the cost of residential units (dependent variable).

Design/methodology/approach

The method of the present study is descriptive-analytical and has an applied purpose. The used statistical population in this study is the residential units’ price in Tehran in 2021. For this purpose, the average per square meter of residential units in the city neighborhoods was entered in the geographical information system. Two techniques of ordinary least squares regression and geographically weighted regression have been used to analyze housing prices and modeling. Then, the results of the ordinary least squares regression and geographically weighted regression models were compared by using the housing price interpolation map predicted in each model and the accurate housing price interpolation map.

Findings

Based on the results, the ordinary least squares regression model has poorly modeled housing prices in the study area. The results of the geographically weighted regression model show that the variables (access rate to sports fields, distance from gas station and water station) have a direct and significant effect. Still, the variable (distance from fault) has a non-significant impact on increasing housing prices at a city level. In addition, to identify the affecting variables of housing prices, the results confirm the desirability of the geographically weighted regression technique in terms of accuracy compared to the ordinary least squares regression technique in explaining housing prices. The results of this study indicate that the housing prices in Tehran are affected by the access level to urban services and facilities.

Originality/value

Identifying factors affecting housing prices helps create sustainable housing in Tehran. Building sustainable housing represents spending less energy during the construction process together with the utilization phase, which ultimately provides housing at an acceptable price for all income deciles. In housing construction, the more you consider the sustainable housing principles, the more sustainable housing you provide and you take a step toward sustainable development. Therefore, sustainable housing is an important planning factor for local authorities and developers. As a result, it is necessary to institutionalize an integrated vision based on the concepts of sustainable development in the field of housing in the Tehran metropolis.

Details

International Journal of Housing Markets and Analysis, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1753-8270

Keywords

Article
Publication date: 5 April 2024

Fateme Akhlaghinezhad, Amir Tabadkani, Hadi Bagheri Sabzevar, Nastaran Seyed Shafavi and Arman Nikkhah Dehnavi

Occupant behavior can lead to considerable uncertainties in thermal comfort and air quality within buildings. To tackle this challenge, the use of probabilistic controls to…

Abstract

Purpose

Occupant behavior can lead to considerable uncertainties in thermal comfort and air quality within buildings. To tackle this challenge, the use of probabilistic controls to simulate occupant behavior has emerged as a potential solution. This study seeks to analyze the performance of free-running households by examining adaptive thermal comfort and CO2 concentration, both crucial variables in indoor air quality. The investigation of indoor environment dynamics caused by the occupants' behavior, especially after the COVID-19 pandemic, became increasingly important. Specifically, it investigates 13 distinct window and shading control strategies in courtyard houses to identify the factors that prompt occupants to interact with shading and windows and determine which control approach effectively minimizes the performance gap.

Design/methodology/approach

This paper compares commonly used deterministic and probabilistic control functions and their effects on occupant comfort and indoor air quality in four zones surrounding a courtyard. The zones are differentiated by windows facing the courtyard. The study utilizes the energy management system (EMS) functionality of EnergyPlus within an algorithmic interface called Ladybug Tools. By modifying geometrical dimensions, orientation, window-to-wall ratio (WWR) and window operable fraction, a total of 465 cases are analyzed to identify effective control scenarios. According to the literature, these factors were selected because of their potential significant impact on occupants’ thermal comfort and indoor air quality, in addition to the natural ventilation flow rate. Additionally, the Random Forest algorithm is employed to estimate the individual impact of each control scenario on indoor thermal comfort and air quality metrics, including operative temperature and CO2 concentration.

Findings

The findings of the study confirmed that both deterministic and probabilistic window control algorithms were effective in reducing thermal discomfort hours, with reductions of 56.7 and 41.1%, respectively. Deterministic shading controls resulted in a reduction of 18.5%. Implementing the window control strategies led to a significant decrease of 87.8% in indoor CO2 concentration. The sensitivity analysis revealed that outdoor temperature exhibited the strongest positive correlation with indoor operative temperature while showing a negative correlation with indoor CO2 concentration. Furthermore, zone orientation and length were identified as the most influential design variables in achieving the desired performance outcomes.

Research limitations/implications

It’s important to acknowledge the limitations of this study. Firstly, the potential impact of air circulation through the central zone was not considered. Secondly, the investigated control scenarios may have different impacts on air-conditioned buildings, especially when considering energy consumption. Thirdly, the study heavily relied on simulation tools and algorithms, which may limit its real-world applicability. The accuracy of the simulations depends on the quality of the input data and the assumptions made in the models. Fourthly, the case study is hypothetical in nature to be able to compare different control scenarios and their implications. Lastly, the comparative analysis was limited to a specific climate, which may restrict the generalizability of the findings in different climates.

Originality/value

Occupant behavior represents a significant source of uncertainty, particularly during the early stages of design. This study aims to offer a comparative analysis of various deterministic and probabilistic control scenarios that are based on occupant behavior. The study evaluates the effectiveness and validity of these proposed control scenarios, providing valuable insights for design decision-making.

Details

Smart and Sustainable Built Environment, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2046-6099

Keywords

Article
Publication date: 4 April 2024

Richard Kadan, Temitope Seun Omotayo, Prince Boateng, Gabriel Nani and Mark Wilson

This study aimed to address a gap in subcontractor management by focusing on previously unexplored complexities surrounding subcontractor management in developing countries. While…

Abstract

Purpose

This study aimed to address a gap in subcontractor management by focusing on previously unexplored complexities surrounding subcontractor management in developing countries. While past studies concentrated on selection and relationships, this study delved into how effective subcontractor management impacts project success.

Design/methodology/approach

This study used the Bayesian Network analysis approach, through a meticulously developed questionnaire survey refined through a piloting stage involving experienced industry professionals. The survey was ultimately distributed among participants based in Accra, Ghana, resulting in a response rate of approximately 63%.

Findings

The research identified diverse components contributing to subcontractor disruptions, highlighted the necessity of a clear regulatory framework, emphasized the impact of financial and leadership assessments on performance, and underscored the crucial role of main contractors in Integrated Project and Labour Cost Management with Subcontractor Oversight and Coordination.

Originality/value

Previous studies have not considered the challenges subcontractors face in projects. This investigation bridges this gap from multiple perspectives, using Bayesian network analysis to enhance subcontractor management, thereby contributing to the successful completion of construction projects.

Details

Journal of Financial Management of Property and Construction , vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1366-4387

Keywords

1 – 10 of 215