Search results

1 – 10 of 223
Article
Publication date: 1 March 1994

Brian Kenny and Bob Trick

Explores the problems of manager development within the context of themove from a command to a free economy. Places particular emphasis onissues concerned with the education of…

342

Abstract

Explores the problems of manager development within the context of the move from a command to a free economy. Places particular emphasis on issues concerned with the education of manager educators and trainers, with reference to the Czech Republic. Proposes models of development for both large and small businesses and addresses their scope and limitations.

Details

European Business Review, vol. 94 no. 1
Type: Research Article
ISSN: 0955-534X

Keywords

Content available
Article
Publication date: 1 February 2002

405

Abstract

Details

Anti-Corrosion Methods and Materials, vol. 49 no. 1
Type: Research Article
ISSN: 0003-5599

Keywords

Case study
Publication date: 1 December 2009

Gina Vega, Herbert Sherman and Thomas Leach

This is the sixth in a series of articles about case research, writing, teaching, and reviewing. In this article, the protagonist, Prof. Moore, consults experienced case reviewers…

Abstract

This is the sixth in a series of articles about case research, writing, teaching, and reviewing. In this article, the protagonist, Prof. Moore, consults experienced case reviewers and learns several different approaches to reviewing cases for journal publication. The article is written as if it were a case; it is fictitious.

Details

The CASE Journal, vol. 6 no. 1
Type: Case Study
ISSN: 1544-9106

Case study
Publication date: 1 December 2004

Barry R. Armandi, Herbert Sherman and Gina Vega

This article, written in case format, has been written to assist the novice case writer in case research and writing. The article covers all aspects of case writing including…

Abstract

This article, written in case format, has been written to assist the novice case writer in case research and writing. The article covers all aspects of case writing including: idea generation and sources of cases, working with primary and secondary case sources, obtaining client releases, writing the case story line, developing a catchy ‘hook’, using the past tense, providing supporting exhibits, and providing a bibliography for the case. The teaching note (or instructor's manual)is also covered in detail including: an overview of the case, learning objectives, course placement and targeted audience, instructional methodologies, case questions and answers, the epilogue, and the bibliography. Appendix A includes a discussion on case publishing and includes a list of journals and conferences which accept cases.

Details

The CASE Journal, vol. 1 no. 1
Type: Case Study
ISSN: 1544-9106

Abstract

Details

Magic
Type: Book
ISBN: 978-1-80455-613-9

Article
Publication date: 1 January 1988

AS ALWAYS, at this the beginning of a New Year, we are incurably optimistic. Our credo can be summed up in one word: chiliasm, a belief that times will get better.

Abstract

AS ALWAYS, at this the beginning of a New Year, we are incurably optimistic. Our credo can be summed up in one word: chiliasm, a belief that times will get better.

Details

Work Study, vol. 37 no. 1
Type: Research Article
ISSN: 0043-8022

Open Access
Article
Publication date: 4 December 2020

Sudip Patra and Partha Ghose

The current paper is a brief review of the emerging field of quantum-like modelling in game theory. This paper aims to explore several quantum games, which are superior compared…

1025

Abstract

Purpose

The current paper is a brief review of the emerging field of quantum-like modelling in game theory. This paper aims to explore several quantum games, which are superior compared to their classical counterparts, which means either they give rise to superior Nash equilibria or they make the game fairer. For example, quantum Prisoners Dilemma generates Pareto superior outcomes as compared to defection outcome in the famous classical case. Again, a quantum-like version of cards game can make the game fairer, increasing the chance of winning of players who are disadvantaged in the classical case. This paper explores all the virtues of simple quantum games, also highlighting some findings of the authors as regards Prisoners Dilemma game.

Design/methodology/approach

As this is a general review paper, the authors have not demonstrated any specific mathematical method, rather explored the well-known quantum probability framework, used for designing quantum games. They have a short appendix which explores basic structure of Hilbert space representation of human decision-making.

Findings

Along with the review of the extant literature, the authors have also highlighted some new findings for quantum Prisoners Dilemma game. Specifically, they have shown in the earlier studies (which are referred to here) that a pure quantum entanglement set up is not needed for designing better games, even a weaker condition, which is classical entanglement is sufficient for producing Pareto improved outcomes.

Research limitations/implications

Theoretical research, with findings and implications for future game designs, it has been argued that it is not always needed to have true quantum entanglement for superior Nash Equilibria.

Originality/value

The main purpose here is to raise awareness mainly in the social science community about the possible applications of quantum-like game theory paradigm. The findings related to Prisoners Dilemma game are, however, original.

Book part
Publication date: 26 August 2019

Luc Peters

Abstract

Details

Connecting Values to Action: Non-Corporeal Actants and Choice
Type: Book
ISBN: 978-1-78973-308-2

Article
Publication date: 29 October 2020

Oleksii Konashevych

The purpose of this paper is to present a concept of the protocol for public registries based on blockchain. New database protocol aims to use the benefits of blockchain…

Abstract

Purpose

The purpose of this paper is to present a concept of the protocol for public registries based on blockchain. New database protocol aims to use the benefits of blockchain technologies and ensure their interoperability.

Design/methodology/approach

This paper is framed with design science research (DSR). The primary method is exaptation, i.e. adoption of solutions from other fields. The research is looking into existing technologies which are applied here as elements of the protocol: Name-Value Storage (NVS), Berkley DB, RAID protocol, among others. The choice of NVS as a reference technology for creating a database over blockchain is based on the analysis and comparison with two other similar technologies Bigchain and Amazon QLDB.

Findings

The proposed mechanism allows creating a standard database over a bundle of distributed ledgers. It ensures a blockchain agnostic approach and uses the benefits of various blockchain technologies in one ecosystem. In this scheme, blockchains play the role of journal storages (immutable log), whereas the overlaid database is the indexed storage. The distinctive feature of such a system is that in blockchain, users can perform peer-to-peer transactions directly in the ledger using blockchain native mechanism of user access management with public-key cryptography (blockchain does not require to administrate its database).

Originality/value

This paper presents a new method of creating a public peer-to-peer database across a bundle of distributed ledgers.

Details

International Journal of Web Information Systems, vol. 16 no. 5
Type: Research Article
ISSN: 1744-0084

Keywords

Article
Publication date: 17 September 2008

Alex M. Andrew

The purpose of this paper is to review developments on the internet, especially those of general cybernetic interest.

397

Abstract

Purpose

The purpose of this paper is to review developments on the internet, especially those of general cybernetic interest.

Design/methodology/approach

The ever‐present problem of spam, or unsolicited e‐mail, is reviewed with reference to its discussion in a particular web site, one of a useful series. A new means of automatic personal identification by face recognition is described. A valuable “blog” (web‐log or open online diary), with information and discussion of mainly software topics, is introduced. Software allowing manipulation of the PC registry is discussed, with the observation that it is unfortunate that registry operation is opaque to users.

Findings

The paper finds that spam is with us in increasing volume. Automatic face recognition has been achieved. The opacity of an important part of the PC operating system is partially remedied by available software.

Practical implications

Some anti‐spam measures are reviewed. Face recognition as a means of identification has a number of advantages including operation without intrusive gadgetry such as fingerprint sensors. The opacity of operation of a PC registry is regrettable but is partially remedied by availability of certain software.

Originality/value

It is hoped this is a valuable periodic review.

Details

Kybernetes, vol. 37 no. 8
Type: Research Article
ISSN: 0368-492X

Keywords

1 – 10 of 223