Search results

1 – 5 of 5
Article
Publication date: 12 August 2020

Bilal Naqvi, Nathan Clarke and Jari Porras

The purpose of this paper is to present an integrative framework for handling the security and usability conflicts during the system development lifecycle. The framework has been…

Abstract

Purpose

The purpose of this paper is to present an integrative framework for handling the security and usability conflicts during the system development lifecycle. The framework has been formulated while considering key concerns raised after conducting a series of interviews with practitioners from the industry. The framework is aimed at assisting system designers and developers in making reasonably accurate choices when it comes to the trade-offs between security and usability. The outcomes of using the framework are documented as design patterns, which are disseminated among the community of system designers and developers for use in other but similar contexts.

Design/methodology/approach

A design science research approach was used to develop the integrative framework for usable security. Interviews were conducted for identification of the key concerns; however, the framework was validated during a workshop. Moreover, to validate the patterns’ template and the usable security pattern identified after instantiating the framework, a survey instrument was used.

Findings

It is important to consider the usability aspect in the development of security systems; otherwise, the systems, despite being secure against attacks, would be susceptible to user mistakes leading to compromises. It is worthwhile to handle usable security concerns right from the start of system development life cycle. Design patterns can help the developers in assessing the usability of their security options.

Practical implications

Practical implications

The framework would assist the designers and developers in handling the security and usability conflicts right from the start of the system development life cycle. The patterns documented after using the framework would help not only the designers and developers working in the industry but also freelancers.

Originality/value

The authors present a novel framework to handle the security and usability conflicts during the system development life cycle. The development process of the framework was driven by the concerns raised after a series of interviews with the practitioners from industry. The framework presented in this paper was validated during a workshop in which it was exposed for review and comments by the participants from the industry. To demonstrate the use of patterns in general and the framework in particular, a case study featuring smart grids from the domain of cyber-physical systems is presented, which (to the best of the authors’ knowledge) features the first work relevant to usable security in the domain of cyber-physical systems.

Details

Information & Computer Security, vol. 29 no. 1
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 2 November 2018

Ossi Ylijoki and Jari Porras

The purpose of this paper is to present a process-theory-based model of big data value creation in a business context. The authors approach the topic from the viewpoint of a…

2317

Abstract

Purpose

The purpose of this paper is to present a process-theory-based model of big data value creation in a business context. The authors approach the topic from the viewpoint of a single firm.

Design/methodology/approach

The authors reflect current big data literature in two widely used value creation frameworks and arrange the results according to a process theory perspective.

Findings

The model, consisting of four probabilistic processes, provides a “recipe” for converting big data investments into firm performance. The provided recipe helps practitioners to understand the ingredients and complexities that may promote or demote the performance impact of big data in a business context.

Practical implications

The model acts as a framework which helps to understand the necessary conditions and their relationships in the conversion process. This helps to focus on success factors which promote positive performance.

Originality/value

Using well-established frameworks and process components, the authors synthetize big data value creation-related papers into a holistic model which explains how big data investments translate into economic performance, and why the conversion sometimes fails. While the authors rely on existing theories and frameworks, the authors claim that the arrangement and application of the elements to the big data context is novel.

Details

Business Process Management Journal, vol. 25 no. 5
Type: Research Article
ISSN: 1463-7154

Keywords

Open Access
Article
Publication date: 14 May 2018

Jayden Khakurel, Helinä Melkas and Jari Porras

The purpose of this paper is to expand current knowledge about the recent trend of wearable technology to assess both its potential in the work environment and the challenges…

14206

Abstract

Purpose

The purpose of this paper is to expand current knowledge about the recent trend of wearable technology to assess both its potential in the work environment and the challenges concerning the utilisation of wearables in the workplace.

Design/methodology/approach

After establishing exclusion and inclusion criteria, an independent systematic search of the ACM Digital Library, IEEE Xplore, ScienceDirect and Web of Science databases for relevant studies was performed. Out of a total of 359 articles, 34 met the selection criteria.

Findings

This review identifies 23 categories of wearable devices. Further categorisation of the devices based on their utilisation shows they can be used in the work environment for activities including monitoring, augmenting, assisting, delivering and tracking. The review reveals that wearable technology has the potential to increase work efficiency among employees, improve workers’ physical well-being and reduce work-related injuries. However, the review also reveals that technological, social, policy and economic challenges related to the use of wearable devices remain.

Research limitations/implications

Many studies have investigated the benefits of wearable devices for personal use, but information about the use of wearables in the work environment is limited. Further research is required in the fields of technology, social challenges, organisation strategies, policies and economics to enhance the adoption rate of wearable devices in work environments.

Originality/value

Previous studies indicate that occupational stress and injuries are detrimental to employees’ health; this paper analyses the use of wearable devices as an intervention method to monitor or prevent these problems. Introducing a categorisation framework during implementation may help identify which types of device categories are suitable and could be beneficial for specific utilisation purposes, facilitating the adoption of wearable devices in the workplace.

Article
Publication date: 28 December 2021

Craig Proctor-Parker and Riaan Stopforth

The purpose of the research has been the primary consideration and evaluation of a cost effective, reliable, robust and simple process of radio frequency identification…

157

Abstract

Purpose

The purpose of the research has been the primary consideration and evaluation of a cost effective, reliable, robust and simple process of radio frequency identification (RFID)-based stock control, asset management and monitoring of concrete safety bollards used in the road environment. Likewise, the consideration of the use of the same system and technology to other items in and around the general road infrastructure.

Design/methodology/approach

The research approach undertaken has been an evaluation of the use of currently available RFID technology, with a key emphasis on low cost, ease of use, reliability and convenience. Practical field exercises completed in considering the relevant RFID tags and readers and associated software and apps and necessary software integration and development have been undertaken. At the same time, evaluating the specific limits created in the specific environment is being applied. Of particular interest has been the use of a moving scan in a vehicle drive-through or pass-bye, type reading system. This has been determined to be viable and completely practical, drastically reducing the key issue of time-taken. Practical application of the system from idea to real life application has been undertaken. The integration of the use of the RFID tag and reader system with necessary and related software to database upload and storage has been established. The creation of an online facility to allow the appropriate use of the data and to include the convenient output of an asset report has been undertaken.

Findings

The findings have provided the necessary insight confirming the use of RFID technology as a simple yet reliable, cost effective and adaptable stock control, asset management and geo-locating system in the road environment. The use of such systems in this particular environment is in its infancy, and is perhaps novel and original in the specific aspect of using the system to stock control, manage and monitor road safety concrete bollards and other roadside objects in the road environment.

Originality/value

To establish if in fact, stock control geo-locating can be reliably undertaken with the use of RFID tags and readers in the specific road and road construction environment, particularly with the use of moving RFID reading of passive tags. To establish the minimum requirements of a field usable RFID tag and reader, specifically applicable to the concrete safety bollards, however to other roadside furniture. To identify the minimum requirements of a function, simple app to minimise general requirements of the overall stock control and monitoring of the RFID-tagged objects. To establish the possibility of reading the tag data, global positioning system (GPS) location and video imaging footage as a single operation function. To determine the basic parameters or limits of the GPS geo-locating, on the proposed products selected and overall system. To determine the current best practice in respect of reasonable accuracy and detail in relation to price considerations to a fully function stock control and monitoring system. To identify the minimum requirements of an online database to receive, house and provide ongoing access to and report on the data. To identify the key differences and benefits between traditional stock control and monitoring systems, against that of proposed RFID tag, read and geo-locating system.

Details

Journal of Engineering, Design and Technology , vol. 22 no. 1
Type: Research Article
ISSN: 1726-0531

Keywords

Article
Publication date: 6 April 2023

Luiz Philipi Calegari, Barkokebas R.D. and Diego Castro Fettermann

The evolution of e-health technologies presents promising alternatives for health-care excellence. Despite the benefits arising from mobile e-health (m-health) and wearables…

Abstract

Purpose

The evolution of e-health technologies presents promising alternatives for health-care excellence. Despite the benefits arising from mobile e-health (m-health) and wearables technologies, the literature stands many contradictories signs regarding how users accept and engage in using these technologies. This study aims to synthesize the estimations about m-health user acceptance technologies.

Design/methodology/approach

A meta-analytic structural equation modeling was carried out using the 778 relationships estimated by 100 previous research. The estimations follow the relations and constructs proposed in the UTAUT2 technological acceptance model.

Findings

The results indicate the performance expectancy, effort expectancy, social influence and habit constructs are most important for predicting the behavioral intention of use of m-health technologies. The Latin American users of e-health technologies are still underestimated in the literature.

Originality/value

The study presents a guide to understanding the acceptance process of m-health technologies and delivers a general orientation for developing new m-health devices considering their acceptance by users.

Details

International Journal of Lean Six Sigma, vol. 15 no. 1
Type: Research Article
ISSN: 2040-4166

Keywords

1 – 5 of 5