Search results

1 – 10 of 20
Article
Publication date: 1 January 1979

In order to succeed in an action under the Equal Pay Act 1970, should the woman and the man be employed by the same employer on like work at the same time or would the woman still…

Abstract

In order to succeed in an action under the Equal Pay Act 1970, should the woman and the man be employed by the same employer on like work at the same time or would the woman still be covered by the Act if she were employed on like work in succession to the man? This is the question which had to be solved in Macarthys Ltd v. Smith. Unfortunately it was not. Their Lordships interpreted the relevant section in different ways and since Article 119 of the Treaty of Rome was also subject to different interpretations, the case has been referred to the European Court of Justice.

Details

Managerial Law, vol. 22 no. 1
Type: Research Article
ISSN: 0309-0558

Content available
Article
Publication date: 1 December 2003

Richard Whitfield

443

Abstract

Details

International Journal of Retail & Distribution Management, vol. 31 no. 12
Type: Research Article
ISSN: 0959-0552

Article
Publication date: 17 April 2009

Barbara F.H. Allen

The purpose of this paper is to introduce librarians, faculty, and other interested individuals to contemporary German literature in English translation.

Abstract

Purpose

The purpose of this paper is to introduce librarians, faculty, and other interested individuals to contemporary German literature in English translation.

Design/methodology/approach

German‐language authors born in 1950 or later and listed on the Contemporary Living Authors Comprehensive List developed by the German vendor Otto Harrassowitz are searched in OCLC's WorldCat database to determine the existence of English translations. A bio‐bibliographical list is then developed featuring all contemporary German‐language authors who have achieved an English language translation of at least one of their literary works.

Findings

Of the approximately 1,400 writers on Harrassowitz's comprehensive list, a surprisingly large number of almost 80 authors of the younger generation (born in 1950 or later) have been translated into English.

Originality/value

This bio‐bibliography of contemporary German belles lettres (of the younger generation) in English translation is the first of its kind. It can be used by librarians to check their current library holdings and to expand their collections of German literature in English translation.

Details

Collection Building, vol. 28 no. 2
Type: Research Article
ISSN: 0160-4953

Keywords

Article
Publication date: 21 July 2020

Mohammad Moradi and Qi Li

Over the past decade, many research works in various disciplines have benefited from the endless ocean of people and their potentials (in the form of crowdsourcing) as an…

Abstract

Purpose

Over the past decade, many research works in various disciplines have benefited from the endless ocean of people and their potentials (in the form of crowdsourcing) as an effective problem-solving strategy and computational model. But nothing interesting is ever completely one-sided. Therefore, when it comes to leveraging people's power, as the dark side of crowdsourcing, there are some possible threats that have not been considered as should be, such as recruiting black hat crowdworkers for organizing targeted adversarial intentions. The purpose of this paper is to draw more attention to this critical issue through investigation of its different aspects.

Design/methodology/approach

To delve into details of such malicious intentions, the related literature and previous researches have been studied. Then, four major typologies for adversarial crowdsourced attacks as well as some real-world scenarios are discussed and delineated. Finally, possible future threats are introduced.

Findings

Despite many works on adversarial crowdsourcing, there are only a few specific research studies devoted to considering the issue in the context of cyber security. In this regard, the proposed typologies (and addressed scenarios) for such human-mediated attacks can shed light on the way of identifying and confronting such threats.

Originality/value

To the best of the authors' knowledge, this the first work in which the titular topic is investigated in detail. Due to popularity and efficiency of leveraging crowds' intelligence and efforts in a wide range of application domains, it is most likely that adversarial human-driven intentions gain more attention. In this regard, it is anticipated that the present research study can serve as a roadmap for proposing defensive mechanisms to cope with such diverse threats.

Details

Journal of Information, Communication and Ethics in Society, vol. 19 no. 1
Type: Research Article
ISSN: 1477-996X

Keywords

Article
Publication date: 1 July 1930

WE write on the eve of an Annual Meeting of the Library Association. We expect many interesting things from it, for although it is not the first meeting under the new…

Abstract

WE write on the eve of an Annual Meeting of the Library Association. We expect many interesting things from it, for although it is not the first meeting under the new constitution, it is the first in which all the sections will be actively engaged. From a membership of eight hundred in 1927 we are, in 1930, within measurable distance of a membership of three thousand; and, although we have not reached that figure by a few hundreds—and those few will be the most difficult to obtain quickly—this is a really memorable achievement. There are certain necessary results of the Association's expansion. In the former days it was possible for every member, if he desired, to attend all the meetings; today parallel meetings are necessary in order to represent all interests, and members must make a selection amongst the good things offered. Large meetings are not entirely desirable; discussion of any effective sort is impossible in them; and the speakers are usually those who always speak, and who possess more nerve than the rest of us. This does not mean that they are not worth a hearing. Nevertheless, seeing that at least 1,000 will be at Cambridge, small sectional meetings in which no one who has anything to say need be afraid of saying it, are an ideal to which we are forced by the growth of our numbers.

Details

New Library World, vol. 33 no. 2
Type: Research Article
ISSN: 0307-4803

Article
Publication date: 10 August 2022

Omar AlHussainan, Ying Guo, Hussain Gulzar Rammal, Ryan W. Tang and Ismail Golgeci

The purpose of this study is to empirically investigate the dark side of business-to-business (B2B) relationships in traditional business practices worldwide that rely on strong…

Abstract

Purpose

The purpose of this study is to empirically investigate the dark side of business-to-business (B2B) relationships in traditional business practices worldwide that rely on strong networks.

Design/methodology/approach

This study applies a questionnaire survey to collect data from buyers in 224 Kuwaiti firms and uses the partial least squares structural equation model for data analysis.

Findings

Drawing on the social exchange theory, we test the relationships between B2B wasta, relationship satisfaction, innovation and efficiency. The findings show that despite the belief that wasta brings long-term benefits when applied in B2B relationships, it negatively impacts the firm’s efficiency.

Originality/value

This study contributes to the existing literature on B2B relationships by identifying important issues related to the multifaceted nature of B2B wasta relationships. The study confirms the importance of relational and innovation benefits over economic consequences based on elements of social exchange theory, which extends our current understanding of the application of SET in B2B wasta relationships.

Details

Journal of Business & Industrial Marketing, vol. 38 no. 5
Type: Research Article
ISSN: 0885-8624

Keywords

Article
Publication date: 5 September 2018

Daniel Trabucchi and Tommaso Buganza

The pervasive spread of digital technologies brought an incredible boost in data availability. Companies are dealing with massive amount of data that wait to be exploited. At the…

5204

Abstract

Purpose

The pervasive spread of digital technologies brought an incredible boost in data availability. Companies are dealing with massive amount of data that wait to be exploited. At the same time, scholars are providing different strategies and methods to help companies capture the value embedded in their data to foster innovation and improve the efficiency of existing processes. In these research studies, data are the by-product of something else, and they are a silent asset that needs to be exploited. What if data might be considered the final goal? The paper aims to discuss these issues.

Design/methodology/approach

The research is based on an exploratory multiple case study analysis, on the basis of three cases used as an illustration for new ideas. In particular, the gathered data are analyzed according to models previously presented in the literature review, building on and expanding them.

Findings

The research proposes a data-driven approach to innovation, offering a peculiar view of the innovation process. The trigger point is the need of data that let begin the entire development process of a complex system. In this perspective, the application that data are a by-product of the entire innovation process and not the primary output is peculiar since the vast majority of the literature consider data as the by-product of the primary product.

Research limitations/implications

Future research is needed to assess the replicability of the model outside the mobile app industry and to measure its performances. Nevertheless, this paper provides insights both for scholars and managers, enlarging the discussion on digital innovation and digital business models.

Practical implications

The results provide a development process to foster innovation relying on the need of data as the trigger point, guiding entrepreneurs and managers in the building process of the entire digital system.

Originality/value

Previous research studies often considered Big Data (BD) in innovation as a way to enlarge the current product offer or to make the innovation process more effective or efficient; this paper changes the perspective by considering BD as the trigger and the enabler of the entire digital innovation process.

Details

European Journal of Innovation Management, vol. 22 no. 1
Type: Research Article
ISSN: 1460-1060

Keywords

Article
Publication date: 2 November 2020

Fabio Ramazzini Bechara and Samara Bueno Schuch

This study aims to define objectively what are the elements that should be considered in the repositioning of international cooperation, less under its value, which is…

1081

Abstract

Purpose

This study aims to define objectively what are the elements that should be considered in the repositioning of international cooperation, less under its value, which is unquestionable, but more under the optics of the procedure, how can it be operationalized. International cooperation goes beyond the regulatory effort, which, although an important step, is insufficient. It is inserted in an environment in which there is a multiplicity of forces and instances, non-converging and tensioned. At the same time, in the authors’ view, it is not about cooperation between states or between states and international organizations only, it must understand the private sector equally, which has the expressive property of the technologies used.

Design/methodology/approach

The study uses an interdisciplinary approach, and the method of analysis is the typothetical deductive.

Findings

Cybersecurity as a global and complex issue demands cooperation between nations, but also the private sector and civil society engagement. It also demands a good governance in the decision making process, more integrated, accurated and precised.

Originality/value

This study is original, and it represents a special concern and vision from professional and academic fields.

Details

Journal of Financial Crime, vol. 28 no. 2
Type: Research Article
ISSN: 1359-0790

Keywords

Abstract

Details

Personnel Review, vol. 51 no. 8
Type: Research Article
ISSN: 0048-3486

Article
Publication date: 29 June 2022

Robin Hofmeester and Daniel R. Eyers

There is now much emphasis in both research and practice on the principles of circular economies. In this paper remanufacturing is examined as a key enabler of circular practices…

Abstract

Purpose

There is now much emphasis in both research and practice on the principles of circular economies. In this paper remanufacturing is examined as a key enabler of circular practices, and the concept of “Product-Agnostic Manufacturing” (PAR) is proposed. This work differentiates PAR from many traditional approaches to remanufacturing by virtue of PAR's treatment of product variety. Most existing approaches to remanufacturing feature low variety and standardisation; this study instead suggests that the exploitation of flexibilities in both operations and supply chains leads to new competitive strategies for firms to exploit.

Design/methodology/approach

This is a conceptual study that builds on a thorough exploration of contemporary remanufacturing literature in the development of the new PAR concept.

Findings

Through a detailed literature review it is shown that there are a range of benefits, challenges, and critical success factors that underpin the remanufacturing concept. Building on this understanding and bridging literature in operations flexibility and supply chain design, a detailed discussion on the nature of PAR is provided, and an agenda for future research developed.

Originality/value

Whilst there has been much literature on remanufacturing, there is a general tendency to treat supply chain and remanufacturing operations quite distinctly in individual articles. Additionally, there has been little consideration of multi-product remanufacturing, and for the limited studies where this is done, the emphasis is typically on problem avoidance. This study aims to provide a detailed insight into the developed PAR concept, showing how the remanufacture of a wide range of product varieties may be achieved through flexible operations and supply chain design.

Details

The International Journal of Logistics Management, vol. 34 no. 6
Type: Research Article
ISSN: 0957-4093

Keywords

1 – 10 of 20