Search results

1 – 10 of 20
Article
Publication date: 1 April 1995

S.M. Jenei, O.S. Aleksić, L.D. Živanov and D.I. Raković

Ni‐ferrite powder average grain size less than 0.9µm was used for the ferrite paste preparation. Ferrite paste was printed on Al2O3 substrate and fired 850°C/10min. After…

Abstract

Ni‐ferrite powder average grain size less than 0.9µm was used for the ferrite paste preparation. Ferrite paste was printed on Al2O3 substrate and fired 850°C/10min. After Ni‐ferrite thick film characterization had been done, simple planar inductor geometry, such as square spirals, were printed on it. Measurements were done, using an HP 4194A impedance analyser. The experimental results were summarized and compared with theoretical predictions given by the electromagnetic analysis using the method of current images for the reason of accounting the effect of magnetic substrate. The computer program, developed here, allows determination of the required thickness of the substrate which will produce inductance enhancement of the given permeability of the substrate material. The same results can also be used to determine the permeability of magnetic film or substrate quickly and are directly applicable to the design of the planar inductors.

Details

COMPEL - The international journal for computation and mathematics in electrical and electronic engineering, vol. 14 no. 4
Type: Research Article
ISSN: 0332-1649

Article
Publication date: 5 January 2010

Mario Vašak and Nedjeljko Perić

The purpose of this paper is to elaborate a robust model‐based protective control algorithm for multi‐mass motor drives that are subjected to physical and safety constraints on…

Abstract

Purpose

The purpose of this paper is to elaborate a robust model‐based protective control algorithm for multi‐mass motor drives that are subjected to physical and safety constraints on their variables.

Design/methodology/approach

The algorithm relies on the off‐line computed maximum robust controlled invariant set or its approximation for the given drive system and imposed constraints. It can be used to patch any existing drive control scheme with a firm constraints satisfaction guarantee. The online patch implementation is actually a simple correction of the control signal computed with the existing control scheme, with a mandatory state observer.

Findings

Performance of the patch is tested on a two‐mass drive system in combination with classical two‐mass drive speed controllers – P+I and reduced state controller. All constraints violations that exist in the presented responses obtained without the protection patch are suppressed by using the patch which shows the effectiveness of the approach. A brief implementation analysis shows that a digital signal processor could be used for online implementation of the controller with the protective patch.

Originality/value

Robust invariant sets theory is efficiently and effectively used in a new application area – protection of multi‐mass electrical drives.

Details

COMPEL - The international journal for computation and mathematics in electrical and electronic engineering, vol. 29 no. 1
Type: Research Article
ISSN: 0332-1649

Keywords

Open Access
Article
Publication date: 10 July 2023

Réka Tamássy, Zsuzsanna Géring, Gábor Király, Réka Plugor and Márton Rakovics

This study aims to investigate how highly ranked business schools portray ideal students in terms of their attributes and their agency. Understanding how these higher education…

Abstract

Purpose

This study aims to investigate how highly ranked business schools portray ideal students in terms of their attributes and their agency. Understanding how these higher education institutions (HEIs) discursively construct their present and prospective students also shed light on the institutions’ self-representation, the portrayal of the student–institution relationship and eventually the discursive construction of higher education’s (HE) role.

Design/methodology/approach

To understand this dynamic interrelationship, this study uses mixed methodological textual analysis first quantitatively identifying different modes of language use and then qualitatively analysing them.

Findings

With this approach, this study identified six language use groups. While the portrayal of the business schools and that of the students are always co-constructed, these groups differ in the extent of student and organisational agency displayed as well as the role and purpose of the institution. Business schools are always active agents in these discourses, but their roles and the students’ agency vary greatly across these six groups.

Practical implications

These findings can help practitioners determine how students are currently portrayed in their organisational texts, how their peers and competitors talk and where they want to position themselves in relation to them.

Originality/value

Previous studies discussed the ideal HE students from the perspective of the students or their educators. Other analyses on HE discourse focused on HEIs’ discursive construction and social role This study, however, unveils how the highly ranked business schools in their external organisational communication discursively construct their ideals and expectations for both their students and the general public.

Details

Journal of International Education in Business, vol. 17 no. 1
Type: Research Article
ISSN: 2046-469X

Keywords

Article
Publication date: 9 August 2021

Mohammed Abbas and Adnan Alghail

The mobile shadow information technology (IT) phenomenon is both completely misunderstood and negatively explored by those participating inside the organizational ecosystem. It…

Abstract

Purpose

The mobile shadow information technology (IT) phenomenon is both completely misunderstood and negatively explored by those participating inside the organizational ecosystem. It represents all internet-based software, any other solutions for communications or employees’ sharing without any formal authorization or approval from the IT department. Such behavior can lead to a security breach of the organization’s data privacy, as these risks could disseminate it without the organization fully knowing. Recent research identifies that shadow IT is rarely covered from the knowledge sharing and knowledge protection (KP) perspective. This paper aims to provide an insight on how mobile shadow IT as a phenomenon could impact KP of an organization as a whole.

Design/methodology/approach

This is an exploratory study based on a qualitative approach. The authors conducted interviews with 11 IT users to answer the main research question. The interview guidelines were divided into three parts: types of mobile shadow IT and occurrence; KP nature in the workplace; and mobile shadow IT impact on KP.

Findings

The research findings identified that most interviewees use mobile shadow IT without any notice or permission from their IT departments. This sharing also negatively impacts the KP in the organization. The most common mobile shadow IT applications are the clouded type like Dropbox, Google Drive and WhatsApp. Interviewees are using mobile shadow IT mainly because organizations do not provide suitable tools to communicate efficiently. The authors concluded that mobile shadow IT harms KP with no security and privacy on what is being shared because this process is unmonitored by the organization.

Practical implications

For adequate knowledge and data protection, IT departments need to take more actions and efforts. This study can help IT decision-makers cope with the technology changes while understanding mobile shadow IT impacts. This study also offers insight regarding types of applications that can be used as an alternative tool for employees rather than using unauthorized applications. This research shows that medium-sized organizations are free to use these applications, which can cause damage to organizations.

Originality/value

This research is arguably among the first to explore the interviewees’ perspectives on how mobile shadow IT impacts KP. This paper also provides theoretical and practical insights by identifying the three primary constructs and how mobile shadow IT usage can affect KP.

Details

VINE Journal of Information and Knowledge Management Systems, vol. 53 no. 4
Type: Research Article
ISSN: 2059-5891

Keywords

Article
Publication date: 19 November 2021

Zhiting Song and Jianhua Zhu

Smart manufacturing is the prime gripper for the transformation and upgrading of the manufacturing industry. Smart manufacturing systems (SMSs) largely determine how smart…

Abstract

Purpose

Smart manufacturing is the prime gripper for the transformation and upgrading of the manufacturing industry. Smart manufacturing systems (SMSs) largely determine how smart manufacturing evolves in technical and organizational dimensions and how it realizes values in products, production or services. SMSs are growing rapidly and receiving tons of attention from academic research and industrial practice. However, the development of SMSs is still in its fancy, and many issues wait to be identified and solved, such as single point failures, low transparency and ineffective resource sharing. Blockchain, an emerging technology deriving from Bitcoin, is competent to aid SMSs to conquer troubles due to its decentralization, traceability, trackability, disintermediation, auditability and etc. The purpose of this paper is to investigate the blockchain applications in SMSs, seek out the challenges faced by blockchain-enabled SMSs (BSMSs) and provide referable research directions and ideas.

Design/methodology/approach

A comprehensive literature review as a survey is conducted in this paper. The survey starts by introducing blockchain concepts, followed by the descriptions of a literature review method and the blockchain applications throughout the product life cycle in SMSs. Then, the key issues and challenges confronting BSMSs are discussed and some possible research directions are also proposed. It finally presents qualitative and quantitative descriptions of BSMSs, along with some conclusions and implications.

Findings

The findings of this paper present a deep understanding about the current status and challenges of blockchain adoption in SMSs. Furthermore, this paper provides a brand new thinking for future research.

Originality/value

This paper minutely analyzes the impacts that blockchain exerts on SMSs in view of the product life cycle, and proposes using the complexity science thinking to deal with BSMSs qualitatively and quantitatively, including tackling the current major problems BSMSs face. This research can serve as a foundation for future theoretical studies and enterprise practice.

Details

Chinese Management Studies, vol. 16 no. 5
Type: Research Article
ISSN: 1750-614X

Keywords

Open Access
Article
Publication date: 2 February 2018

Wil van der Aalst

Process mining provides a generic collection of techniques to turn event data into valuable insights, improvement ideas, predictions, and recommendations. This paper uses…

9072

Abstract

Purpose

Process mining provides a generic collection of techniques to turn event data into valuable insights, improvement ideas, predictions, and recommendations. This paper uses spreadsheets as a metaphor to introduce process mining as an essential tool for data scientists and business analysts. The purpose of this paper is to illustrate that process mining can do with events what spreadsheets can do with numbers.

Design/methodology/approach

The paper discusses the main concepts in both spreadsheets and process mining. Using a concrete data set as a running example, the different types of process mining are explained. Where spreadsheets work with numbers, process mining starts from event data with the aim to analyze processes.

Findings

Differences and commonalities between spreadsheets and process mining are described. Unlike process mining tools like ProM, spreadsheets programs cannot be used to discover processes, check compliance, analyze bottlenecks, animate event data, and provide operational process support. Pointers to existing process mining tools and their functionality are given.

Practical implications

Event logs and operational processes can be found everywhere and process mining techniques are not limited to specific application domains. Comparable to spreadsheet software widely used in finance, production, sales, education, and sports, process mining software can be used in a broad range of organizations.

Originality/value

The paper provides an original view on process mining by relating it to the spreadsheets. The value of spreadsheet-like technology tailored toward the analysis of behavior rather than numbers is illustrated by the over 20 commercial process mining tools available today and the growing adoption in a variety of application domains.

Details

Business Process Management Journal, vol. 24 no. 1
Type: Research Article
ISSN: 1463-7154

Keywords

Open Access
Article
Publication date: 24 September 2024

Lena Grzesiak and Wojciech Ulrych

We aimed to determine how remote management support (MS) practices and staff diversity influenced employee performance (EP) within the digital workplace (DW) during the COVID-19…

Abstract

Purpose

We aimed to determine how remote management support (MS) practices and staff diversity influenced employee performance (EP) within the digital workplace (DW) during the COVID-19 pandemic. The article highlights the challenges managers face in achieving EP in the DW compared to traditional work environments.

Design/methodology/approach

We developed a theoretical model (MS→DW→EP) and tested it based on the computer-assisted web interview (CAWI) conducted in mid-2022. Factors of primary, secondary and organizational diversity moderated the relationship between the variables. We purposely selected a sample of 1,000 respondents with remote working experience.

Findings

The results show that the DW partially mediates the relationship between MS and EP. The greater the uncertainty in managing people, the more flexibility, trust and job satisfaction required in the DW to achieve EP. Organizational diversity influenced the model more (i.e. teamwork vs individual work) than the primary and secondary diversity (i.e. gender and education).

Research limitations/implications

Although the sample size was large, we cannot consider it statistically representative.

Practical implications

Zoomers and Millennials reflect full mediation in the model that supports EP.

Social implications

Broader work autonomy, smaller organizations and teams as well as hybrid work arrangements, reduce the necessity for in-person meetings with superiors.

Originality/value

Supervisors had to reduce control over the DW while expanding organizational citizenship behavior (OCB) to enhance job satisfaction and thus ensure the expected EP during the pandemic. We may consider allowing an employee to postpone work as a new managerial activity within MS.

Details

Central European Management Journal, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2658-0845

Keywords

Case study
Publication date: 20 January 2017

Steven Rogers, Sachin Waikar and Scott T. Whitaker

In the fall of 2007 a senior director of product marketing at Qwest in Denver, Colorado, gets an offer to work for an entrepreneurial high-growth venture. The vision is for…

Abstract

In the fall of 2007 a senior director of product marketing at Qwest in Denver, Colorado, gets an offer to work for an entrepreneurial high-growth venture. The vision is for greater wealth, accelerated business opportunity, more thrill on the job, and faster path to leadership by pursuing a position with a start-up firm. Kiva Allgood has management responsibility in her current position (e.g., manages a high-budget portfolio), with compensation of $145,000 in salary and incentive bonuses up to 100% of base salary. She realizes that she is not prepared for the negotiation because she has only negotiated job offers within large firms. She needs to know what many of these entrepreneurial finance terms mean and to understand whether she is being offered terms and amounts commensurate with the value she feels she will bring to the entrepreneur. She also needs to understand her opportunity cost and the expected value of her options: staying with the current job, starting her own venture, or taking this offer at the entrepreneurial venture. She had no idea there were also so many additional, non-financial factors to take into consideration. With her future on the line, she needs to work through the numbers fast. The entrepreneur gave her five days to come back with a counter offer, which he considered a generous amount of time. In evaluating these questions, students will take Allgood's point of view. The case is based on a real job offer to a real person named Kiva Allgood. The entrepreneur and his firm are fictitious in order to heighten the issues in this situation.

Exposes customary negotiations between a prospective employee and an entrepreneur, taking into account the valuation of the entrepreneurial firm, salary, stock options, ownership percentage, etc.; Examines the difference between considering a position with an entrepreneurial venture and one at a stable corporate organization; Looks at typical compensation criteria for entrepreneurial venture capital-backed firms; Introduces method for assessing an entrepreneur as a prospective future employer.

Details

Kellogg School of Management Cases, vol. no.
Type: Case Study
ISSN: 2474-6568
Published by: Kellogg School of Management

Keywords

Article
Publication date: 11 May 2021

John P. Myers

This study examines whether online asynchronous discussion forums support student’s meaning-making about citizenship in a globalizing world. Citizenship is an increasingly…

Abstract

Purpose

This study examines whether online asynchronous discussion forums support student’s meaning-making about citizenship in a globalizing world. Citizenship is an increasingly contested identity for young people, yet they have few opportunities in traditional civic education to consider their own citizenship. Although online discussions are considered effective spaces for increasing dialogue and critical thinking between diverse students, there has been little research to understand how effective they are for helping students to construct new understandings of citizenship.

Design/methodology/approach

A content analysis approach was used to analyze and code 89 discussion board posts. The Interaction Analysis Model (IAM) coding scheme was used to describe and analyze the quality of knowledge construction that occurred across the posts focusing on different aspects of global citizenship.

Findings

The findings demonstrate that the discussion boards produced substantive talks about the meaning of citizenship that in some instances reached the level of new knowledge construction. The students considered different meanings for global citizenship and negotiated positions on key issues. However, the highest levels of knowledge construction were rarely reached.

Practical implications

A major implication is the need to organize and cue discussion boards to support knowledge construction in addition to fostering dialogue.

Originality/value

This study contributes to the role that technology can play in supporting students’ knowledge construction about global citizenship that go beyond the scripted meanings conveyed in civics classes.

Details

Asian Education and Development Studies, vol. 11 no. 4
Type: Research Article
ISSN: 2046-3162

Keywords

Open Access
Article
Publication date: 29 August 2023

Yoshija Walter

There is evidence that spirituality at the workplace has positive effects on work outcomes, and there are different models conceptualizing the construct. To date, there is no…

5038

Abstract

Purpose

There is evidence that spirituality at the workplace has positive effects on work outcomes, and there are different models conceptualizing the construct. To date, there is no discussion highlighting how digitalization is affecting workplace spirituality and vice versa. The present review tries to close this gap by discussing the psychological dynamics in light of digitalization and spirituality in the context of work.

Design/methodology/approach

This is a conceptual discussion based on an extensive narrative review. The conceptual design is further tested with a real-life case study.

Findings

The result is a model that may guide future research, which consists of the four highly interdependent domains, namely psychology (with the dimensions of emotion, cognition and behavior), digitalization (with the dimensions of platforms, data and algorithms), spirituality (with the dimensions of meaning, self-transcendation and belonging), as well as the workplace (with the dimensions of work tasks, location, community and culture and values). The discussion includes implications for the future of work, suggestions for management decisions and potential future research directions.

Originality/value

To date, there are many discussions about digital transformation and a limited amount of them have invested in analyzing psychological dimensions. The application to spirituality and the workplace – especially when the two are combined – is almost wholly absent, which makes the present discussion both innovative and original.

Details

Digital Transformation and Society, vol. 3 no. 1
Type: Research Article
ISSN: 2755-0761

Keywords

1 – 10 of 20