PurposeDespite the efforts of project managers and the widespread use of project management methodologies, most of the projects remain unfulfilling in terms of delivering targeted performance. This for most part can be attributed to the inability of an organization to implement control mechanisms and ineffective management of complexity risk. Keeping in view the aforementioned problem, the objective of this study is to investigate the association between control modes and project performance. Moreover, this study also examines the moderating role of complexity risk on the association among various control modes and project performance.Design/methodology/approachThe data were collected from 171 construction projects through a postal questionnaire survey. Partial least squares structural equation modeling was utilized for testing the hypothesized relationships of the research model.FindingsThis study found significant positive relation between formal and informal control mechanisms and project performance. It is found that complexity risk significantly moderates the relationship between control modes and project performance. The results indicate that complexity risk positively moderates the relationship between outcome control and clan control with project performance. Furthermore, complexity risks negatively moderates the relationship between behavior control and project performance. However, the association between self-control and project performance is found insignificant in the presence of complexity risk.Originality/valueThis study is the first attempt to study the relationship of control mechanisms, complexity risk and project performance in the construction industry.
Microcontroller is a computer on single integrated circuit that includes a CPU, RAM, some form of ROM, and I/O ports. It has great impact in our life which cannot be ignored. Unlike a general purpose computer, microcontrollers are dedicated to perform a specified task and execute single application. Automatically controlled products like automatic engine control systems, remote controls, power tools, toys, and office machines i.e. photocopier , printer, and fax machines which are used commonly; are being programmed using microcontroller. Any person working in the field of electronics has the knowledge to use a microcontroller but not necessarily be having good programming skills for it. While programing for a microcontroller, one has to interact with different software tools i.e. Proteus for making circuit diagram, mikroC PRO for source coding, and QL-PROGen for burning hex file in microcontroller. So it is really a tough task to program a microcontroller for such persons. Our work aims to extend the automatic programmer tool [1] that generates mikroC code and its hex file from a block diagram. This enhanced tool provides an integrated platform that allows the user to design circuit diagram, generate its code, and burn the hex file directly into the microcontroller. It provides a set of blocks for business logics; that are used to build an algorithm of application as an input for source code generation. In addition, it provides the feature to compile the generated code and then to burn the hex file directly into the chip. The microcontrollers used in this tool are PIC18F442, PIC18F4520, and PIC18F542; placed in the middle of Circuit Diagram Window of this tool.
The number of IoT devices connected to the global network is expected to be three times more, from 9.7 billion in 2020 to more than 29 billion in 2030. Globally connected IoT devices transmit enormous amounts of facts and figures daily via the internet for various purposes which is about users including important, intimate, or private information. As this data can be utilized for malevolent reasons, these devices constitute a privacy risk. IoT systems involved sensors gathering data from the environment, so known as cyber-physical systems which are highly vulnerable. Hence, user privacy issues such as password stealing, information and identity stealing, intruding, corrupting information, etc. are increasing day by day. Therefore, privacy experts and researchers are very much concerned about preventing user privacy issues and developed many PETs (blind signature, group signature, attribute-based credentials (ABCs), anonymous and pseudonymous data authentication, onion routing, encrypted communications, etc.) to prevent user privacy risks in IoT.
For long-term relationships, the websites of various businesses store the PII and PHI of customers, which are mainly targeted by hackers. Cyber breaches mainly result in lack of customer trust and downfall of the business reputation. As a result, the customers become reluctant to share PII and PHI with online businesses until provided with the protection of sensitive data. The online resources of a business need to be in compliance with GDPR and PCI DSS. Companies undergo penetration testing of the infrastructure; for this, paid white hat hackers are hired under a legal contract. The companies also adopt RVDP program, where the Bug Bounty Platforms is one of the variants of RVDP. Security researchers are rewarded with an amount of bounty in the form of money or name in the hall of fame at official website for bugs' identification. Ideally, the security researcher would perform cyber security assessment. The vulnerabilities would be reported to intended stakeholders and the remediation measures with great deal of care so that PII and PHI won't be exploited by anyone.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.