3,872 research outputs found
30th European Congress on Obesity (ECO 2023)
This is the abstract book of 30th European Congress on Obesity (ECO 2023
Reversing the Irreversible: Mitigating Legal Risks of Blockchain-Based Data Breach through Corporate Governance
The European General Data Protection Regulation (GDPR) embodies a set of enforceable data subject rights, data controller and processor obligations, and compliance requirements. The GDPR outreach is extraterritorial and impacts US blockchain-based businesses that collect and process personal data of individuals from the EU. Given the ambiguities of the law itself surrounding what is considered as personal data on blockchain, and who data controllers and processors are, this research examines the corporate governance response to the GDPR as a bottom-up solution for compliance. To secure the sustainability of the business models based on blockchain solutions there is an immediate need to revisit traditional agency theory of corporate governance. Modern theory of corporate governance must inevitably integrate Corporate Social Responsibility and Environmental, Social, and Governance standards into its policies and procedures to mitigate risks and hedge against breaches of data security and privacy
Essays on Innovations in Public Sector Auditing
The current antecedents of innovation in the public sector, that is, the adoption of SDGs and the unprecedented technological advancements exert pressures on the Supreme audit institutions’(SAIs) current socio-technical system. This has led SAIs to adopt different strategies to maintain their relevance and improve the quality of their work and operations. This thesis investigated the different types of innovations currently happening in the SAIs environment and how SAIs are reacting to the demands of these changes. This exploratory work captured public sector audit innovation through the following three essays:
The first essay focused on Digital Transformation (DT), investigated how SAIs approach, and interpret DT. In this regard, DT was investigated from a SAIs perspective. Due to it being a novel topic in public sector auditing research, a qualitative research method was adopted, this method was supported with expert interviews and archival and or document data. Key findings revealed that the definition of DT varies from SAI to SAI, and this variation resulted from the differences in the level of digital development in each country. SAIs applied reactive and, in some situations proactive change strategies were applied. In the reactive strategy, SAIs reacted to change induced by a situational demand while in the proactive strategy, they experiment with technologies in advance. Most of the SAIs applying proactive change strategy operates an innovation lab or an experimentation space(see Bojovic, Sabatier, and Coblence 2020; Bucher and Langley 2016; Cartel, Boxenbaum, and Aggeri 2019; Wulf 2000). As an impact on public sector auditing profession, the research addresses the popular narrative of SAI’s equating digitization or the use of digital technologies to Digital transformation. It reiterated the holistic nature of DT, by pointing at the risk involved when DT is tied solely to technology adoption strategy ignoring other aspects such as people, organizational structure, strategy, culture, etc.La trasformazione in corso dell'ambiente esterno delle Istituzioni Superiori di Controllo (ISC, Corte dei conti) sta modificando le esigenze di controllo e le aspettative dei vari stakeholders coinvolti. Infatti, questa trasformazione, innescato dai progressi tecnologici, dall'adozione degli Obiettivi di Sviluppo Sostenibile (OSS) e dalla trasparenza sta modificando il modo e gli strumenti con cui viene esercitata l’attività di controllo. Ciò ha portato le ISC a adottare diverse strategie ed a introdurre diverse innovazioni per mantenere la loro rilevanza e migliorare la qualità del loro servizio. Vari autori hanno evidenziato la necessità di indagare circa le implicazioni del cambio della strategia di controllo e dell’adozione delle varie innovazioni tecnologiche nelle ISC. Il lavoro di tesi contribuisce in questa direzione e indaga sulle varie innovazioni tecnologiche adottate dalle ISC e come questi Istituzioni hanno reagito alle pressioni esterne di cambiamento. La tesi adotta un approccio esplorativo e sviluppa tre diverse ricerche per rispondere alla domanda principale di ricerca.
La prima ricerca si concentra sulla trasformazione digitale (TD), e indaga su come le ISC hanno affrontato e interpretato la TD. La metodologia utilizzata è di tipo qualitativo. Sono state effettuate varie interviste a esperti del settore a livello internazionale oltre all’analisi documentale degli archivi delle varie istituzioni analizzate. I risultati hanno mostrato una diversa interpretazione e percezione, tra le istituzioni oggetto dello studio, del concetto della TD, dovuta alle differenze di sviluppo digitale nei vari paesi analizzati. Inoltre, i risultati mostrano che le ISC hanno adottato strategie reattive di cambiamento e, in alcune situazioni, hanno adottato strategie proattive. Nel primo caso, che rappresenta la maggioranza dei casi analizzati, le ISC hanno reagito al bisogno ovvero quando si presenta una necessità di cambiamento. Mentre nel secondo caso, ovvero di strategia di cambiamento proattivo, le ISC hanno sperimentato le tecnologie in anticipo. La maggior parte delle Istituzioni che ha adottato strategie proattive di cambiamento gestisce un laboratorio di innovazione o uno spazio di sperimentazione (vedi Bojovic, Sabatier e Coblence 2020; Bucher e Langley 2016; Cartel, Boxenbaum e Aggeri 2019; Wulf 2000). Inoltre, la ricerca mostra come la digitalizzazione o l'uso delle tecnologie digitali vengono equiparati alla TD nelle ISC. Questo rischio di interpretazione del concetto si concretizza soprattutto, come mostrano i risultati, quando la TD viene legata esclusivamente alla strategia di adozione della tecnologia ignorando altri aspetti come le persone, la struttura organizzativa, la strategia, la cultura, ecc
Towards a Digital Capability Maturity Framework for Tertiary Institutions
Background: The Digital Capability (DC) of an Institution is the extent to which the institution's culture, policies, and infrastructure enable and support digital practices (Killen et al., 2017), and maturity is the continuous improvement of those capabilities. As technology continues to evolve, it is likely to give rise to constant changes in teaching and learning, potentially disrupting Tertiary Education Institutions (TEIs) and making existing organisational models less effective. An institution’s ability to adapt to continuously changing technology depends on the change in culture and leadership decisions within the individual institutions. Change without structure leads to inefficiencies, evident across the Nigerian TEI landscape. These inefficiencies can be attributed mainly to a lack of clarity and agreement on a development structure.
Objectives: This research aims to design a structure with a pathway to maturity, to support the continuous improvement of DC in TEIs in Nigeria and consequently improve the success of digital education programmes.
Methods: I started by conducting a Systematic Literature Review (SLR) investigating the body of knowledge on DC, its composition, the relationship between its elements and their respective impact on the Maturity of TEIs. Findings from the review led me to investigate further the key roles instrumental in developing Digital Capability Maturity in Tertiary Institutions (DCMiTI).
The results of these investigations formed the initial ideas and constructs upon which the proposed structure was built. I then explored a combination of quantitative and qualitative methods to substantiate the initial constructs and gain a deeper understanding of the relationships between elements/sub-elements. Next, I used triangulation as a vehicle to expand the validity of the findings by replicating the methods in a case study of TEIs in Nigeria. Finally, after using the validated constructs and knowledge base to propose a structure based on CMMI concepts, I conducted an expert panel workshop to test the model’s validity.
Results: I consolidated the body of knowledge from the SLR into a universal classification of 10 elements, each comprising sub-elements. I also went on to propose a classification for DCMiTI. The elements/sub-elements in the classification indicate the success factors for digital maturity, which were also found to positively impact the ability to design, deploy and sustain digital education. These findings were confirmed in a UK University and triangulated in a case study of Northwest Nigeria. The case study confirmed the literature findings on the status of DCMiTI in Nigeria and provided sufficient evidence to suggest that a maturity structure would be a well-suited solution to supporting DCM in the region. I thus scoped, designed, and populated a domain-specific framework for DCMiTI, configured to support the educational landscape in Northwest Nigeria.
Conclusion: The proposed DCMiTI framework enables TEIs to assess their maturity level across the various capability elements and reports on DCM as a whole. It provides guidance on the criteria that must be satisfied to achieve higher levels of digital maturity. The framework received expert validation, as domain experts agreed that the proposed Framework was well applicable to developing DCMiTI and would be a valuable tool to support TEIs in delivering successful digital education. Recommendations were made to engage in further iterations of testing by deploying the proposed framework for use in TEI to confirm the extent of its generalisability and acceptability
Investigating the effect of media synchronicity in professional use of video conferencing applications
Thomas, M. A., Sandhu, R. K., Oliveira, A., & Oliveira, T. (2023). Investigating the effect of media synchronicity in professional use of video conferencing applications. Internet Research. https://doi.org/10.1108/INTR-12-2021-0887---Funding: This work was supported by national funds through FCT (Fundação para a Ciência e a Tecnologia) under the project - UIDB/04152/2020 - Centro de Investigação em Gestão de Informação (MagIC).Abstract Purpose This research aims to gain a holistic understanding of how video conferencing (VC) apps' media characteristics influence individuals' perceptions of VC apps and, ultimately, their use and continued use in professional settings. Design/methodology/approach A conceptual research model is developed by integrating constructs from media synchronicity theory (MST), social presence theory and the unified theory of acceptance and use of technology (UTAUT2) model, as well as ubiquity, technicality and perceived fees. Structural equation modeling (SEM) is used to empirically test the conceptual model using data collected from 252 working professionals from the European Union. Findings The results reveal that while performance expectancy (PE) and facilitating conditions (FC) are fundamental to VC app use, these factors alone do not explain the use and continuing use of VC apps in the professional context. Media characteristics that include synchronicity, social presence, and ubiquity are equally crucial to professionals using VC apps. It also confirms the moderating effect of convergence on the relationship between synchronicity and PE and the moderating effect of technicality and perceived fees on the relationship between ubiquity and FC. Originality/value For researchers, the study offers insights into the extent to which technological and socially derived characteristics of VC apps influence the routine tasks undertaken by professionals in virtual work settings. For practitioners, recommendations pivotal to the use of VC apps are presented to promote higher acceptance and improved well-being of the professional workforce.authorsversionepub_ahead_of_prin
Improving approaches to material inventory management in construction industry in the UK
Materials used in construction constitute a major proportion of the total cost of construction projects. An important factor of great concern that adversely affects construction projects is the location and tracking of materials, which normally come in bulk with minimal identification. There is inadequate integration of modern wireless technologies (such as Radio Frequency Identification (RFID), Personal Digital Assistant (PDA) or Just-in-Time (JIT)) into project management systems for easier and faster materials management and tracking and to overcome human error. This research focuses on improving approaches to material inventory management in the UK construction industry through the formulation of RFID-based materials management tracking process system with projects.
Existing literature review identified many challenges/problems in material inventory management on construction projects, such as supply delays, shortages, price fluctuations, wastage and damage, and insufficient storage space. Six construction projects were selected as exploratory case studies and cross-case analysis was used to investigate approaches to material inventory management practices: problems, implementation of ICT, and the potential for using emerging wireless technologies and systems (such as RFID and PDA) for materials tracking. Findings showed that there were similar problems of storage constraints and logistics with most of the construction projects. The synthesis of good practices required the implementation of RFID-facilitated construction management of materials tracking system to make material handling easier, quicker, more efficient and less paperwork. There was also a recommendation to implement Information and Communication Technology (ICT) tools to integrate plant, labour and materials into one system.
The findings from the cases studies and the literature review were used to formulate a process for real-time material tracking using Radio Frequency Identification (RFID) that can improve material inventory management in the UK construction industry. Testing and validation undertaken assisted in formulating a process that can be useful, functional and acceptable for a possible process system’s development. Finally, research achievements/contributions to knowledge, and limitations were discussed and some suggestions for further research were outlined
Recommended from our members
Anomaly detection for IoT networks using machine learning
This thesis was submitted for the award of Doctor of Philosophy and was awarded by Brunel University LondonThe Internet of Things (IoT) is considered one of the trending technologies today. IoT affects various industries, including logistics tracking, healthcare, automotive and smart cities. A rising number of cyber-attacks and breaches are rapidly targeting networks equipped with IoT devices. This thesis aims to improve security in IoT networks by enhancing anomaly detection using machine learning.
This thesis identified the challenges and gaps related to securing the Internet of Things networks. The challenges are network size, the number of devices, the human factor, and the complexity of IoT networks. The gaps identified include the lack of research on signature-based intrusion detection systems used for anomaly detection, in addition to the lack of modelling input parameters required for anomaly detection in IoT networks. Furthermore, there is a lack of comparison of the performance of machine learning algorithms on standard and real IoT datasets.
This thesis creates a dataset to test the anomaly binary classification performance of the Neural Networks, Gaussian Naive Bayes, Support Vector Machine, and Decision Trees machine learning algorithms and compares their results with the KDDCUP99 dataset. The results show that Support Vector Machine and Gaussian Naive Bayes perform lower than the other models on the created IoT dataset. This thesis reduces the number of features required by machine learning algorithms for anomaly detection in the IoT networks to five features only, which resulted in reduced execution time by an average of 58%.
This thesis tests CNNwGFC, which is an enhanced Convolutional Neural Network model, in detecting and classifying anomalies in IoT networks. This model achieves an increase of 15.34% in the accuracy for IoT anomaly classification in the UNSW-NB15 compared to the classic Convolutional Neural Network. The CNNwGFC multi-classification accuracy (96.24%) is higher by 7.16 than the highest from the literature
Towards the implementation of a fully-fledged electronic service for citizens: the case for local government in South Africa
The current literature on e-government implementation in South Africa informs this research that there is no framework to guide the implementation of e-government for local municipalities. The public sector does not adopt models that are designed and developed for their context. SA as a developing nation still battles with the implementation of e-government for local government. The research findings in this research depict that the implementation of electronic services is complicated, stagnant, and incoherent due to various factors that hinder its swift implementation. The research commenced its pursuit to identify the factors that hinder the implementation of e-government through conducting four areas of investigations, firstly, the study investigated 205 existing municipal electronic portals to establish the extent to which eportal offers the relevant e-services to the citizens; secondly, the study conducted a research survey and a sample of 579 citizens gave their perspective about e-government services that they receive from local municipalities; thirdly, the study also evaluated the City of Cape Town electronic services to ascertain its adoption; and finally, the study conducted in-depth interviews with 35 e-government experts to understand the factors that hinder the implementation of e-government in SA. The study selected three social theoretical approaches, namely structuration, activity, and agency theories to address the different contexts of the research. Structuration theory has aided the research to ask critical questions about the social structures in local government that affect implementation. The activity theory was used to provide some guidelines to investigate how e-government activities are implemented within the identified social structure. Finally, the agency theory was used to develop a model to guide the implementation of a successful egovernment model by employing a deductive approach. Keywords: e-government, collaboration, citizens, agents, actors, implementation, structuration theory, activity theory, agency theory, and municipalitie
- …