Bilal Naqvi, Nathan Clarke and Jari Porras
The purpose of this paper is to present an integrative framework for handling the security and usability conflicts during the system development lifecycle. The framework has been…
Abstract
Purpose
The purpose of this paper is to present an integrative framework for handling the security and usability conflicts during the system development lifecycle. The framework has been formulated while considering key concerns raised after conducting a series of interviews with practitioners from the industry. The framework is aimed at assisting system designers and developers in making reasonably accurate choices when it comes to the trade-offs between security and usability. The outcomes of using the framework are documented as design patterns, which are disseminated among the community of system designers and developers for use in other but similar contexts.
Design/methodology/approach
A design science research approach was used to develop the integrative framework for usable security. Interviews were conducted for identification of the key concerns; however, the framework was validated during a workshop. Moreover, to validate the patterns’ template and the usable security pattern identified after instantiating the framework, a survey instrument was used.
Findings
It is important to consider the usability aspect in the development of security systems; otherwise, the systems, despite being secure against attacks, would be susceptible to user mistakes leading to compromises. It is worthwhile to handle usable security concerns right from the start of system development life cycle. Design patterns can help the developers in assessing the usability of their security options.
Practical implications
Practical implications
The framework would assist the designers and developers in handling the security and usability conflicts right from the start of the system development life cycle. The patterns documented after using the framework would help not only the designers and developers working in the industry but also freelancers.
Originality/value
The authors present a novel framework to handle the security and usability conflicts during the system development life cycle. The development process of the framework was driven by the concerns raised after a series of interviews with the practitioners from industry. The framework presented in this paper was validated during a workshop in which it was exposed for review and comments by the participants from the industry. To demonstrate the use of patterns in general and the framework in particular, a case study featuring smart grids from the domain of cyber-physical systems is presented, which (to the best of the authors’ knowledge) features the first work relevant to usable security in the domain of cyber-physical systems.
Details
Keywords
The purpose of this paper is to present a process-theory-based model of big data value creation in a business context. The authors approach the topic from the viewpoint of a…
Abstract
Purpose
The purpose of this paper is to present a process-theory-based model of big data value creation in a business context. The authors approach the topic from the viewpoint of a single firm.
Design/methodology/approach
The authors reflect current big data literature in two widely used value creation frameworks and arrange the results according to a process theory perspective.
Findings
The model, consisting of four probabilistic processes, provides a “recipe” for converting big data investments into firm performance. The provided recipe helps practitioners to understand the ingredients and complexities that may promote or demote the performance impact of big data in a business context.
Practical implications
The model acts as a framework which helps to understand the necessary conditions and their relationships in the conversion process. This helps to focus on success factors which promote positive performance.
Originality/value
Using well-established frameworks and process components, the authors synthetize big data value creation-related papers into a holistic model which explains how big data investments translate into economic performance, and why the conversion sometimes fails. While the authors rely on existing theories and frameworks, the authors claim that the arrangement and application of the elements to the big data context is novel.
Details
Keywords
Jayden Khakurel, Helinä Melkas and Jari Porras
The purpose of this paper is to expand current knowledge about the recent trend of wearable technology to assess both its potential in the work environment and the challenges…
Abstract
Purpose
The purpose of this paper is to expand current knowledge about the recent trend of wearable technology to assess both its potential in the work environment and the challenges concerning the utilisation of wearables in the workplace.
Design/methodology/approach
After establishing exclusion and inclusion criteria, an independent systematic search of the ACM Digital Library, IEEE Xplore, ScienceDirect and Web of Science databases for relevant studies was performed. Out of a total of 359 articles, 34 met the selection criteria.
Findings
This review identifies 23 categories of wearable devices. Further categorisation of the devices based on their utilisation shows they can be used in the work environment for activities including monitoring, augmenting, assisting, delivering and tracking. The review reveals that wearable technology has the potential to increase work efficiency among employees, improve workers’ physical well-being and reduce work-related injuries. However, the review also reveals that technological, social, policy and economic challenges related to the use of wearable devices remain.
Research limitations/implications
Many studies have investigated the benefits of wearable devices for personal use, but information about the use of wearables in the work environment is limited. Further research is required in the fields of technology, social challenges, organisation strategies, policies and economics to enhance the adoption rate of wearable devices in work environments.
Originality/value
Previous studies indicate that occupational stress and injuries are detrimental to employees’ health; this paper analyses the use of wearable devices as an intervention method to monitor or prevent these problems. Introducing a categorisation framework during implementation may help identify which types of device categories are suitable and could be beneficial for specific utilisation purposes, facilitating the adoption of wearable devices in the workplace.
Details
Keywords
Craig Proctor-Parker and Riaan Stopforth
The purpose of the research has been the primary consideration and evaluation of a cost effective, reliable, robust and simple process of radio frequency identification…
Abstract
Purpose
The purpose of the research has been the primary consideration and evaluation of a cost effective, reliable, robust and simple process of radio frequency identification (RFID)-based stock control, asset management and monitoring of concrete safety bollards used in the road environment. Likewise, the consideration of the use of the same system and technology to other items in and around the general road infrastructure.
Design/methodology/approach
The research approach undertaken has been an evaluation of the use of currently available RFID technology, with a key emphasis on low cost, ease of use, reliability and convenience. Practical field exercises completed in considering the relevant RFID tags and readers and associated software and apps and necessary software integration and development have been undertaken. At the same time, evaluating the specific limits created in the specific environment is being applied. Of particular interest has been the use of a moving scan in a vehicle drive-through or pass-bye, type reading system. This has been determined to be viable and completely practical, drastically reducing the key issue of time-taken. Practical application of the system from idea to real life application has been undertaken. The integration of the use of the RFID tag and reader system with necessary and related software to database upload and storage has been established. The creation of an online facility to allow the appropriate use of the data and to include the convenient output of an asset report has been undertaken.
Findings
The findings have provided the necessary insight confirming the use of RFID technology as a simple yet reliable, cost effective and adaptable stock control, asset management and geo-locating system in the road environment. The use of such systems in this particular environment is in its infancy, and is perhaps novel and original in the specific aspect of using the system to stock control, manage and monitor road safety concrete bollards and other roadside objects in the road environment.
Originality/value
To establish if in fact, stock control geo-locating can be reliably undertaken with the use of RFID tags and readers in the specific road and road construction environment, particularly with the use of moving RFID reading of passive tags. To establish the minimum requirements of a field usable RFID tag and reader, specifically applicable to the concrete safety bollards, however to other roadside furniture. To identify the minimum requirements of a function, simple app to minimise general requirements of the overall stock control and monitoring of the RFID-tagged objects. To establish the possibility of reading the tag data, global positioning system (GPS) location and video imaging footage as a single operation function. To determine the basic parameters or limits of the GPS geo-locating, on the proposed products selected and overall system. To determine the current best practice in respect of reasonable accuracy and detail in relation to price considerations to a fully function stock control and monitoring system. To identify the minimum requirements of an online database to receive, house and provide ongoing access to and report on the data. To identify the key differences and benefits between traditional stock control and monitoring systems, against that of proposed RFID tag, read and geo-locating system.
Details
Keywords
Luiz Philipi Calegari, Barkokebas R.D. and Diego Castro Fettermann
The evolution of e-health technologies presents promising alternatives for health-care excellence. Despite the benefits arising from mobile e-health (m-health) and wearables…
Abstract
Purpose
The evolution of e-health technologies presents promising alternatives for health-care excellence. Despite the benefits arising from mobile e-health (m-health) and wearables technologies, the literature stands many contradictories signs regarding how users accept and engage in using these technologies. This study aims to synthesize the estimations about m-health user acceptance technologies.
Design/methodology/approach
A meta-analytic structural equation modeling was carried out using the 778 relationships estimated by 100 previous research. The estimations follow the relations and constructs proposed in the UTAUT2 technological acceptance model.
Findings
The results indicate the performance expectancy, effort expectancy, social influence and habit constructs are most important for predicting the behavioral intention of use of m-health technologies. The Latin American users of e-health technologies are still underestimated in the literature.
Originality/value
The study presents a guide to understanding the acceptance process of m-health technologies and delivers a general orientation for developing new m-health devices considering their acceptance by users.