Search results
1 – 10 of 85The study aims to provide a critical review of the extent to which digital technologies are likely to replace human labour, the exponential rise in the amount of work to be done…
Abstract
Purpose
The study aims to provide a critical review of the extent to which digital technologies are likely to replace human labour, the exponential rise in the amount of work to be done and how far distinctively human skills are future-proofed and therefore likely to be in short supply. It reviews the evidence for a permanent switch to home and remote working enabled by emerging technologies. It assesses the business, digital and labour strategies of work organisations and the promise and challenges from a dominant trend towards a digitally enabled flexible labour model.
Design/methodology/approach
A critical review of 1020 plus case studies and the extant literature was carried out.
Findings
The relationship between emerging technologies and work is widely misunderstood, and there are major qualifiers to the idea of an overwhelming tsunami of technology drastically reducing headcounts globally. Distinctive human skills remain valuable, the amount of work to be done is increasing exponentially and automation is becoming more a coping than a labour replacement mechanism. Moves to a hybrid digitalised flexible labour model are promising but not if short-term, and if the challenges they represent are not managed well.
Research limitations/implications
The main limitation is that we are making projections into the future, though we are drawing on a lot of different sources and evidence and past data projected into the future.
Practical implications
The problem is not labour displacement but large skills shortages that will slow down the speed of technology adoption. Skills development is vital, as is the taking of long-term perspectives towards the management of hybrid, flexible working based on human-machine interactions.
Social implications
Organisations need to revitalise their training and development and labour management models. Governments and intermediary institutions need to manage transition states if the skills required to gain economic growth are to be available, and to ensure that large labour pools do not get bypassed from not having requisite skills.
Originality/value
The study offers a more subtle and complex perspective on the emerging evidence about the future of technology and work.
Details
Keywords
Eloise Atkinson, John Spillane, Jim Bradley and Tara Brooks
The purpose of this paper is to investigate the challenges faced with mobile information communication technology (M-ICT), more specifically tablet software, in the construction…
Abstract
Purpose
The purpose of this paper is to investigate the challenges faced with mobile information communication technology (M-ICT), more specifically tablet software, in the construction phase of UK infrastructure projects. Quality assurance in the context of passive fire protection is scrutinised, where M-ICT use is prevalent, to provide an industry perspective.
Design/methodology/approach
The research design is founded on exploratory multiple case study approach. Specific themes are developed, based on a critical review of previous ICT studies. The themes identified are used to inform a qualitative interview protocol for investigating three large UK infrastructure projects. Each project is at different stages in the construction phase, with varying examples of M-ICT implementation in use. Participants are interviewed regarding their experiences of the implementation of M-ICT on each project.
Findings
Findings identify diverse experiences across each project. Single and multiple M-ICT platforms are currently being used, with individual stakeholders using ICT in isolation, and in some instances, multiple project stakeholders are using it together. Complete replacement of paper-based processes is evident in one case study, but more commonly, digital technology is being used in parallel to traditional paper-based processes. The challenges, although varied across each case study, can be categorised under the themes of Technology (IT support, ICT infrastructure, IT security, contractual, software), People (social aspects, user competency, safety), Technical Compliance (technical compliance evidence) and Process (conventional processes).
Originality/value
It is recommended that each theme be reviewed at project commencement, with all key stakeholders, to ensure key aspects are considered prior to M-ICT deployment. This will ensure avoidance of challenges reported and maximise the opportunities that are available through M-ICT in a multi-stakeholder infrastructure project.
Details
Keywords
Eva PenzeyMoog and Danielle C. Slakoff
The reality of domestic violence does not disappear when people enter the digital world, as abusers may use technology to stalk, exploit, and control their victims. In this…
Abstract
The reality of domestic violence does not disappear when people enter the digital world, as abusers may use technology to stalk, exploit, and control their victims. In this chapter, we discuss three unique types of technological abuse: (1) financial abuse via banking websites and apps; (2) abuse via smart home devices (i.e., “Internet of Things” abuse); and (3) stalking via geo-location or GPS. We also argue pregnancy and wellness apps provide an opportunity for meaningful intervention for pregnant victims of domestic violence.
While there is no way to ensure users' safety in all situations, we argue thoughtful considerations while designing and building digital products can result in meaningful contributions to victims' safety. This chapter concludes with PenzeyMoog's (2020) “Framework for Inclusive Safety,” which is a roadmap for building technology that increases the safety of domestic violence survivors. This framework includes three key points: (1) the importance of educating technologists about domestic violence; (2) the importance of identifying possible abuse situations and designing against them; and (3) identifying user interactions that might signal abuse and offering safe interventions.
Details
Keywords
In many security domains, the ‘human in the system’ is often a critical line of defence in identifying, preventing and responding to any threats (Saikayasit, Stedmon, & Lawson…
Abstract
In many security domains, the ‘human in the system’ is often a critical line of defence in identifying, preventing and responding to any threats (Saikayasit, Stedmon, & Lawson, 2015). Traditionally, such security domains are often focussed on mainstream public safety within crowded spaces and border controls, through to identifying suspicious behaviours, hostile reconnaissance and implementing counter-terrorism initiatives. More recently, with growing insecurity around the world, organisations have looked to improve their security risk management frameworks, developing concepts which originated in the health and safety field to deal with more pressing risks such as terrorist acts, abduction and piracy (Paul, 2018). In these instances, security is usually the specific responsibility of frontline personnel with defined roles and responsibilities operating in accordance with organisational protocols (Saikayasit, Stedmon, Lawson, & Fussey, 2012; Stedmon, Saikayasit, Lawson, & Fussey, 2013). However, understanding the knowledge that frontline security workers might possess and use requires sensitive investigation in equally sensitive security domains.
This chapter considers how to investigate knowledge elicitation in these sensitive security domains and underlying ethics in research design that supports and protects the nature of investigation and end-users alike. This chapter also discusses the criteria used for ensuring trustworthiness as well as assessing the relative merits of the range of methods adopted.
Details
Keywords
Over a decade since the Special Criminal Court (SCC) was established in Cameroon, hundreds of individuals have been indicted, tried and convicted. Sentences have been imposed…
Abstract
Purpose
Over a decade since the Special Criminal Court (SCC) was established in Cameroon, hundreds of individuals have been indicted, tried and convicted. Sentences have been imposed, most of which include a term of imprisonment (principal punishment/penalty) and confiscation as accessory penalty or punishment. Research focus has not been directed at the sentences which, as argued in this paper, are inconsistent, incommensurate with the amounts of money stolen and a significant departure from the Penal Code. This paper aims to explore the aspect of sentencing by the SCC.
Design/methodology/approach
To identify, highlight and discuss the issue of sentencing, the paper looks at a blend of primary and secondary materials: primary materials here include but not limited to the judgements of the SCC and other courts in Cameroon and the Penal Code. Secondary materials shall include the works of scholars in the fields of criminal law, criminal justice and penal reform.
Findings
A few findings were made: first, the judges are inconsistent in the manner in which they determine the appropriate sentence. Second, in making that determination, the judges would have been oblivious to the prescripts in the Penal Code, which provides the term of imprisonment, and in the event of a mitigating circumstance, the prescribed minimum to be applied. Yet, the default imposition of an aggravating circumstance (being a civil servant) was not explored by the SCC. Finally, whether the sentences imposed are commensurate with the amounts of monies stolen.
Research limitations/implications
This research unravels key insights into the functioning of the SCC. It advances the knowledge thereon and adds to the literature on corruption in Cameroon.
Practical implications
The prosecution and judges at the SCC should deepen their knowledge of Cameroonian criminal law, especially on the nature of liberty given to judges to determine within the prescribed range of the sentence to be imposed but also consider the existence of an aggravating factor – civil servant. They must also consider whether the sentences imposed befit the crime for which they are convicted.
Originality/value
The paper is an original contribution with new insights on the manner in which sentencing should be approached by the SCC.
Details
Keywords
Covert research has a mixed reputation within the scientific community. Some are unsure of its moral worth, others would proscribe it entirely. This reputation stems largely from…
Abstract
Covert research has a mixed reputation within the scientific community. Some are unsure of its moral worth, others would proscribe it entirely. This reputation stems largely from a lack of knowledge about the reasons for choosing the covert method. In this chapter, these reasons will be reconstructed in detail and all the elements that will allow one to judge the level of ethicality of covert research will be laid out for the reader. In particular, the chapter will answer the following questions: What harms can result from covert research to the subjects participating in the research? Is covert research necessarily deceptive? In which cases is it ethically permissible for a researcher to deceive? What is the scientific added value of the covert research, that is, what does covert research discover that overt research does not? What are the risks to researchers acting undercover? Finally, some suggestions will be offered to research ethics reviewers to help in their appraisal of covert research.
Details
Keywords
Onyeka John Chukwuka, Jun Ren, Jin Wang and Dimitrios Paraskevadakis
Unforeseen events can disrupt the operational process and negatively impact emergency resources optimization and its supply chain. A limited number of studies have addressed risk…
Abstract
Purpose
Unforeseen events can disrupt the operational process and negatively impact emergency resources optimization and its supply chain. A limited number of studies have addressed risk management issues in the context of emergency supply chains, and this existing research lacks inbuilt and practical techniques that can significantly affect the reliability of risk management outcomes. Therefore, this paper aims to identify and practically analyze the specific risk factors that can most likely disrupt the normal functioning of the emergency supply chain in disaster relief operations.
Design/methodology/approach
This paper has used a three-step process to investigate and evaluate risk factors associated with the emergency supply chain. First, the study conducts a comprehensive literature review to identify the risk factors. Second, the research develops a questionnaire survey to validate and classify the identified risk factors. At the end of this step, the study develops a hierarchical structure. Finally, the research investigates the weighted priority of the validated risk factors using the fuzzy-analytical hierarchy process (FAHP) methodology. Experts were required to provide subjective judgments.
Findings
This paper identified and validated 28 specific risk factors prevalent in emergency supply chains. Based on their contextual meanings, the research classified these risk factors into two main categories: internal and external risk factors; four subcategories: demand, supply, infrastructural and environmental risk factors; and 11 risk types: forecast, inventory, procurement, supplier, quality, transportation, warehousing, systems, disruption, social and political risk factors. The most significant risk factors include war and terrorism, the absence of legislative rules that can influence and support disaster relief operations, the impact of cascading disasters, limited quality of relief supplies and sanctions and constraints that can hinder stakeholder collaboration. Therefore, emergency supply chain managers should adopt appropriate strategies to mitigate these risk factors.
Research limitations/implications
This study will contribute to the general knowledge of risk management in emergency supply chains. The identified risk factors and structural hierarchy taxonomic diagram will provide a comprehensive risk database for emergency supply chains.
Practical implications
The research findings will provide comprehensive and systemic support for respective practitioners and policymakers to obtain a firm understanding of the different risk categories and specific risk factors that can impede the effective functioning of the emergency supply chain during immediate disaster relief operations. Therefore, this will inform the need for the improvement of practices in critical aspects of the emergency supply chain through the selection of logistics and supply chain strategies that can ensure the robustness and resilience of the system.
Originality/value
This research uses empirical data to identify, categorize and validate risk factors in emergency supply chains. This study contributes to the theory of supply chain risk management. The study also adopts the fuzzy-AHP technique to evaluate and prioritize these risk factors to inform practitioners and policymakers of the most significant risk factors. Furthermore, this study serves as the first phase of managing risk in emergency supply chains since it motivates future studies to empirically identify, evaluate and select effective strategies that can eliminate or minimize the effects of these risk factors.
Details
Keywords
Unlike quantitative studies, interview data generally cannot be validated; yet, they are typically the only evidence of the research. This study develops protocols for using…
Abstract
Purpose
Unlike quantitative studies, interview data generally cannot be validated; yet, they are typically the only evidence of the research. This study develops protocols for using verbatim interview quotations in research and for assessing the quality of interview quotations.
Design/methodology/approach
This research reviews 20 empirical papers using in-depth interviews containing 600 interview quotations to examine authors' approaches to verbatim interviewee quotations. The research analyses the sample papers for interview transcript handling, selection of quotations, the number and length of interview quotations, how they are placed and presented, the proportion of interviewee voices reproduced in quotations and the disclosure of protocols for translating and editing quotations. This paper includes illustrative interview quotations as exemplars of best practice.
Findings
Given the modest discussion of the principles influencing the reproduction of quotations in research, this study develops a framework for evaluating prior research. Researchers use a wide variety of practices to reproduce interview quotations in accounting research. The issues derived from this review, and their application to interview-based papers, frame an argument for a general set of quality criteria and protocols rather than rigid rules for assessing qualitative work. These criteria can serve as anchor points for qualitative evaluation.
Originality/value
There is little guidance on the use of interview quotations in qualitative research which this study bridges.
Details
Keywords
Patrick John Bruce, Victor Hrymak, Carol Bruce and Joseph Byrne
The purpose of this study is to provide evidence to support an emerging theory that interpersonal conflict is the primary cause of workplace stress among a self-selected sample of…
Abstract
Purpose
The purpose of this study is to provide evidence to support an emerging theory that interpersonal conflict is the primary cause of workplace stress among a self-selected sample of Irish construction managers.
Design/methodology/approach
Eighteen construction managers working in Ireland were recruited for this study. Using semi-structured interviews and interpretative phenomenological analysis as the research methodology, the causes of their workplace stress were investigated.
Findings
Participants reported that the principal cause of their workplace stress was high levels of interpersonal conflict between colleagues. The effects of this interpersonal conflict included avoidance behaviour, ill health, absences from the workplace and loss of productivity issues. Deadlines, penalty clauses, lack of appreciation, cliques, costs, communication, temporary contracts and delays were also reported stressors.
Research limitations/implications
A limitation of the study is the small sample of 18 construction managers and the limited geographical area.
Social implications
The social implications of this study could be to clearly identify that interpersonal conflict may be under reported in the construction industry, and there is a possibility that it is being misclassified as other workplace behaviours such as bullying, harassment and workplace violence. If this is so, this could aid future researchers in addressing this challenging workplace behaviour.
Originality/value
The current consensus in the literature is that the three main causes of workplace stress are bullying, harassment and violence. However, the role and importance of interpersonal conflict as reported in this study, with the exception of North America and China, is not reflected in the wider health and safety research literature. In addition, interpersonal conflict and its reluctance to be reported is largely absent from construction safety research. The findings of this study may be explained if the workplace stress research community is currently misclassifying interpersonal conflict as a manifestation of bullying, harassment or violence. If this is the case, interpersonal conflict needs further research. This is to establish if this cause of construction-related workplace stress needs to be reconsidered as a standalone phenomenon in the wider family of challenging workplace behaviours.
Details