Search results

1 – 10 of over 6000
Content available
Book part
Publication date: 18 April 2022

Oona Hilkamo and Nina Granqvist

Research on cultural entrepreneurship has explored the role of language in making and giving sense to novel ventures and market categories and in legitimating them. We analyze how

Abstract

Research on cultural entrepreneurship has explored the role of language in making and giving sense to novel ventures and market categories and in legitimating them. We analyze how an emerging de novo market category, quantum computing, is constructed through the use of analogies and metaphors. Through a multimodal analysis of interview and newspaper data, we find that in addition to using analogies and metaphors to highlight familiarity, actors also use such tropes to expound the weirdness of the new category, thus marking it as profoundly different and novel. Such tropes have a dual function; they draw the boundaries between science and laypeople but also arouse awe and curiosity among the audiences. Our study thus casts light on the cultural work during de novo category emergence.

Details

Advances in Cultural Entrepreneurship
Type: Book
ISBN: 978-1-80262-207-2

Keywords

Open Access
Article
Publication date: 23 March 2020

Hedaia-t-Allah Nabil Abd Al Ghaffar

The purpose of this paper is to try to reach the main factors that could put national security at risk as a result of government cloud computing programs.

7236

Abstract

Purpose

The purpose of this paper is to try to reach the main factors that could put national security at risk as a result of government cloud computing programs.

Design/methodology/approach

The paper adopts the analytical approach to first lay foundations of the relation between national security, cybersecurity and cloud computing, then it moves to analyze the main vulnerabilities that could affect national security in cases of government cloud computing usage.

Findings

The paper reached several findings such as the relation between cybersecurity and national security as well as a group of factors that may affect national security when governments shift to cloud computing mainly pertaining to storing data over the internet, the involvement of a third party, the lack of clear regulatory frameworks inside and between countries.

Practical implications

Governments are continuously working on developing their digital capacities to meet citizens’ demands. One of the most trending technologies adopted by governments is “cloud computing”, because of the tremendous advantages that the technology provides; such as huge cost-cutting, huge storage and computing capabilities. However, shifting to cloud computing raises a lot of security concerns.

Originality/value

The value of the paper resides in the novelty of the topic, which is a new contribution to the theoretical literature on relations between new technologies and national security. It is empirically important as well to help governments stay safe while enjoying the advantages of cloud computing.

Details

Review of Economics and Political Science, vol. 9 no. 2
Type: Research Article
ISSN: 2356-9980

Keywords

Open Access
Article
Publication date: 23 September 2021

Damian Gordon, Ioannis Stavrakakis, J. Paul Gibson, Brendan Tierney, Anna Becevel, Andrea Curley, Michael Collins, William O’Mahony and Dympna O’Sullivan

Computing ethics represents a long established, yet rapidly evolving, discipline that grows in complexity and scope on a near-daily basis. Therefore, to help understand some of…

3751

Abstract

Purpose

Computing ethics represents a long established, yet rapidly evolving, discipline that grows in complexity and scope on a near-daily basis. Therefore, to help understand some of that scope it is essential to incorporate a range of perspectives, from a range of stakeholders, on current and emerging ethical challenges associated with computer technology. This study aims to achieve this by using, a three-pronged, stakeholder analysis of Computer Science academics, ICT industry professionals, and citizen groups was undertaken to explore what they consider to be crucial computing ethics concerns. The overlap between these stakeholder groups are explored, as well as whether their concerns are reflected in the existing literature.

Design/methodology/approach

Data collection was performed using focus groups, and the data was analysed using a thematic analysis. The data was also analysed to determine if there were overlaps between the literature and the stakeholders’ concerns and attitudes towards computing ethics.

Findings

The results of the focus group analysis show a mixture of overlapping concerns between the different groups, as well as some concerns that are unique to each of the specific groups. All groups stressed the importance of data as a key topic in computing ethics. This includes concerns around the accuracy, completeness and representativeness of data sets used to develop computing applications. Academics were concerned with the best ways to teach computing ethics to university students. Industry professionals believed that a lack of diversity in software teams resulted in important questions not being asked during design and development. Citizens discussed at length the negative and unexpected impacts of social media applications. These are all topics that have gained broad coverage in the literature.

Social implications

In recent years, the impact of ICT on society and the environment at large has grown tremendously. From this fast-paced growth, a myriad of ethical concerns have arisen. The analysis aims to shed light on what a diverse group of stakeholders consider the most important social impacts of technology and whether these concerns are reflected in the literature on computing ethics. The outcomes of this analysis will form the basis for new teaching content that will be developed in future to help illuminate and address these concerns.

Originality/value

The multi-stakeholder analysis provides individual and differing perspectives on the issues related to the rapidly evolving discipline of computing ethics.

Details

Journal of Information, Communication and Ethics in Society, vol. 20 no. 1
Type: Research Article
ISSN: 1477-996X

Keywords

Open Access
Article
Publication date: 19 May 2022

Akhilesh S Thyagaturu, Giang Nguyen, Bhaskar Prasad Rimal and Martin Reisslein

Cloud computing originated in central data centers that are connected to the backbone of the Internet. The network transport to and from a distant data center incurs long…

1048

Abstract

Purpose

Cloud computing originated in central data centers that are connected to the backbone of the Internet. The network transport to and from a distant data center incurs long latencies that hinder modern low-latency applications. In order to flexibly support the computing demands of users, cloud computing is evolving toward a continuum of cloud computing resources that are distributed between the end users and a distant data center. The purpose of this review paper is to concisely summarize the state-of-the-art in the evolving cloud computing field and to outline research imperatives.

Design/methodology/approach

The authors identify two main dimensions (or axes) of development of cloud computing: the trend toward flexibility of scaling computing resources, which the authors denote as Flex-Cloud, and the trend toward ubiquitous cloud computing, which the authors denote as Ubi-Cloud. Along these two axes of Flex-Cloud and Ubi-Cloud, the authors review the existing research and development and identify pressing open problems.

Findings

The authors find that extensive research and development efforts have addressed some Ubi-Cloud and Flex-Cloud challenges resulting in exciting advances to date. However, a wide array of research challenges remains open, thus providing a fertile field for future research and development.

Originality/value

This review paper is the first to define the concept of the Ubi-Flex-Cloud as the two-dimensional research and design space for cloud computing research and development. The Ubi-Flex-Cloud concept can serve as a foundation and reference framework for planning and positioning future cloud computing research and development efforts.

Details

Applied Computing and Informatics, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2634-1964

Keywords

Open Access
Article
Publication date: 30 June 2020

Luca Ferri, Rosanna Spanò, Marco Maffei and Clelia Fiondella

This paper aims to investigate the factors influencing chief executive officers’ (CEOs') intentions to implement cloud technology in Italian small and medium-sized enterprises…

3175

Abstract

Purpose

This paper aims to investigate the factors influencing chief executive officers’ (CEOs') intentions to implement cloud technology in Italian small and medium-sized enterprises (SMEs).

Design/methodology/approach

The study proposes a model that integrates the theoretical construct of the technology acceptance model (TAM) with a classification of perceived benefits and risks related to cloud computing. The study employs a structural equation modeling approach to analyze data gathered through a Likert scale-based survey.

Findings

The findings indicate that risk perception has a strong negative effect on the intention to introduce cloud technology in firms. This effect is partially offset by the perceived ease of use of the technology.

Originality/value

The study provides a new theoretical framework that integrates the TAM and a classification of perceived risks to provide a clear view of management's cognitive processes during technological change. Moreover, the results show the main factors influencing decisions regarding the implementation of cloud computing in firms in light of the perception of risks. Finally, this study provides interesting findings for cloud service providers (CSPs) about their customers' decision-making processes.

Details

European Journal of Innovation Management, vol. 24 no. 3
Type: Research Article
ISSN: 1460-1060

Keywords

Open Access
Article
Publication date: 16 August 2019

Morteza Moradi, Mohammad Moradi, Farhad Bayat and Adel Nadjaran Toosi

Human or machine, which one is more intelligent and powerful for performing computing and processing tasks? Over the years, researchers and scientists have spent significant…

3917

Abstract

Purpose

Human or machine, which one is more intelligent and powerful for performing computing and processing tasks? Over the years, researchers and scientists have spent significant amounts of money and effort to answer this question. Nonetheless, despite some outstanding achievements, replacing humans in the intellectual tasks is not yet a reality. Instead, to compensate for the weakness of machines in some (mostly cognitive) tasks, the idea of putting human in the loop has been introduced and widely accepted. In this paper, the notion of collective hybrid intelligence as a new computing framework and comprehensive.

Design/methodology/approach

According to the extensive acceptance and efficiency of crowdsourcing, hybrid intelligence and distributed computing concepts, the authors have come up with the (complementary) idea of collective hybrid intelligence. In this regard, besides providing a brief review of the efforts made in the related contexts, conceptual foundations and building blocks of the proposed framework are delineated. Moreover, some discussion on architectural and realization issues are presented.

Findings

The paper describes the conceptual architecture, workflow and schematic representation of a new hybrid computing concept. Moreover, by introducing three sample scenarios, its benefits, requirements, practical roadmap and architectural notes are explained.

Originality/value

The major contribution of this work is introducing the conceptual foundations to combine and integrate collective intelligence of humans and machines to achieve higher efficiency and (computing) performance. To the best of the authors’ knowledge, this the first study in which such a blessing integration is considered. Therefore, it is believed that the proposed computing concept could inspire researchers toward realizing such unprecedented possibilities in practical and theoretical contexts.

Details

International Journal of Crowd Science, vol. 3 no. 2
Type: Research Article
ISSN: 2398-7294

Keywords

Content available
Book part
Publication date: 17 August 2022

Theodore S. Ransaw, Michael Lachney and Kevin K. Green

Research suggests there are at least three challenges to Black male interest and success in STEM careers: increasing access to STEM resources and curriculum, increasing Black and…

Abstract

Research suggests there are at least three challenges to Black male interest and success in STEM careers: increasing access to STEM resources and curriculum, increasing Black and male inclusiveness in STEM initiatives, and increasing cultural and technical competency in STEM fields. African American schools typically do not have equitable STEM resources or instruction. In addition, there is limited research on supporting Black males' success in STEM in the culturally responsive computing (CRC) literature. Most STEM initiatives prioritize increasing the number of girls in STEM fields. STEM field employers are not active recruiters of Black male hires and have little experience with diversity and cultural inclusiveness. Research also suggests that Black students may not be interested working in White corporate America that undervalues their unique cultural perspectives and are more concerned with schooling that improves their communities. This chapter utilized CRC as a lens to examine the complexity of engaging Black males in STEM. As a result, the authors suggest adopting an equity ethic to help teachers help Black males connect themselves and their communities to STEM technology by utilizing smartphones and smartphone technology to engage Black males who may not have access to computers. We end with an example of CRC called barbershop computing, which combines computing, engineering, and innovation as a method to attract and retain Black males in STEM classes and help them persist in STEM careers.

Details

Young, Gifted and Missing
Type: Book
ISBN: 978-1-80117-731-3

Keywords

Content available
Book part
Publication date: 16 January 2024

Ayodeji E. Oke and Seyi S. Stephen

Abstract

Details

A Digital Path to Sustainable Infrastructure Management
Type: Book
ISBN: 978-1-83797-703-1

Open Access
Article
Publication date: 25 November 2022

Silvia Regina Veronezi Correia and Cristina Dai Prá Martens

The purpose of this article is to identify the critical success factors (CSFs) of information technology (IT) projects using cloud computing. CSFs are variables that can influence…

2009

Abstract

Purpose

The purpose of this article is to identify the critical success factors (CSFs) of information technology (IT) projects using cloud computing. CSFs are variables that can influence the success of projects and therefore need to be identified and managed appropriately.

Design/methodology/approach

This is an exploratory qualitative study with 23 experts in cloud computing projects through semi-structured interviews. The data was analyzed using content analysis.

Findings

The results present a list of CSFs for projects in a cloud computing environment. The study demonstrated that the CSF with greater relevance to cloud projects is the team’s technical capacity, followed by the support of senior management and the team’s soft skills. In addition, results demonstrated that contract item management is a limiting factor for cloud projects.

Research limitations/implications

The sample comprised only Brazilian experts, so it may not represent the same scenario as in other locations. The CSF ratio for cloud computing projects may vary depending on the company’s maturity in projects of this nature.

Practical implications

The CSF relationship can guide managers in properly conducting cloud computing projects, contributing to minimizing the risks and challenges that may interfere with the project.

Social implications

The relationship of the CSFs in cloud computing projects proposed fills a gap in studies specifically related to this context and tries to minimize project managers’ stress.

Originality/value

Contract items for the cloud context are added to the CSF literature in IT projects, which have not been addressed so far.

Details

RAUSP Management Journal, vol. 58 no. 1
Type: Research Article
ISSN: 2531-0488

Keywords

Open Access
Article
Publication date: 31 July 2020

Ado Adamou Abba Ari, Olga Kengni Ngangmo, Chafiq Titouna, Ousmane Thiare, Kolyang, Alidou Mohamadou and Abdelhak Mourad Gueroui

The Cloud of Things (IoT) that refers to the integration of the Cloud Computing (CC) and the Internet of Things (IoT), has dramatically changed the way treatments are done in the…

6456

Abstract

The Cloud of Things (IoT) that refers to the integration of the Cloud Computing (CC) and the Internet of Things (IoT), has dramatically changed the way treatments are done in the ubiquitous computing world. This integration has become imperative because the important amount of data generated by IoT devices needs the CC as a storage and processing infrastructure. Unfortunately, security issues in CoT remain more critical since users and IoT devices continue to share computing as well as networking resources remotely. Moreover, preserving data privacy in such an environment is also a critical concern. Therefore, the CoT is continuously growing up security and privacy issues. This paper focused on security and privacy considerations by analyzing some potential challenges and risks that need to be resolved. To achieve that, the CoT architecture and existing applications have been investigated. Furthermore, a number of security as well as privacy concerns and issues as well as open challenges, are discussed in this work.

Details

Applied Computing and Informatics, vol. 20 no. 1/2
Type: Research Article
ISSN: 2634-1964

Keywords

1 – 10 of over 6000