Search results
1 – 10 of 20
In order to succeed in an action under the Equal Pay Act 1970, should the woman and the man be employed by the same employer on like work at the same time or would the woman still…
Abstract
In order to succeed in an action under the Equal Pay Act 1970, should the woman and the man be employed by the same employer on like work at the same time or would the woman still be covered by the Act if she were employed on like work in succession to the man? This is the question which had to be solved in Macarthys Ltd v. Smith. Unfortunately it was not. Their Lordships interpreted the relevant section in different ways and since Article 119 of the Treaty of Rome was also subject to different interpretations, the case has been referred to the European Court of Justice.
The purpose of this paper is to introduce librarians, faculty, and other interested individuals to contemporary German literature in English translation.
Abstract
Purpose
The purpose of this paper is to introduce librarians, faculty, and other interested individuals to contemporary German literature in English translation.
Design/methodology/approach
German‐language authors born in 1950 or later and listed on the Contemporary Living Authors Comprehensive List developed by the German vendor Otto Harrassowitz are searched in OCLC's WorldCat database to determine the existence of English translations. A bio‐bibliographical list is then developed featuring all contemporary German‐language authors who have achieved an English language translation of at least one of their literary works.
Findings
Of the approximately 1,400 writers on Harrassowitz's comprehensive list, a surprisingly large number of almost 80 authors of the younger generation (born in 1950 or later) have been translated into English.
Originality/value
This bio‐bibliography of contemporary German belles lettres (of the younger generation) in English translation is the first of its kind. It can be used by librarians to check their current library holdings and to expand their collections of German literature in English translation.
Details
Keywords
Mohammad Moradi and Qi Li
Over the past decade, many research works in various disciplines have benefited from the endless ocean of people and their potentials (in the form of crowdsourcing) as an…
Abstract
Purpose
Over the past decade, many research works in various disciplines have benefited from the endless ocean of people and their potentials (in the form of crowdsourcing) as an effective problem-solving strategy and computational model. But nothing interesting is ever completely one-sided. Therefore, when it comes to leveraging people's power, as the dark side of crowdsourcing, there are some possible threats that have not been considered as should be, such as recruiting black hat crowdworkers for organizing targeted adversarial intentions. The purpose of this paper is to draw more attention to this critical issue through investigation of its different aspects.
Design/methodology/approach
To delve into details of such malicious intentions, the related literature and previous researches have been studied. Then, four major typologies for adversarial crowdsourced attacks as well as some real-world scenarios are discussed and delineated. Finally, possible future threats are introduced.
Findings
Despite many works on adversarial crowdsourcing, there are only a few specific research studies devoted to considering the issue in the context of cyber security. In this regard, the proposed typologies (and addressed scenarios) for such human-mediated attacks can shed light on the way of identifying and confronting such threats.
Originality/value
To the best of the authors' knowledge, this the first work in which the titular topic is investigated in detail. Due to popularity and efficiency of leveraging crowds' intelligence and efforts in a wide range of application domains, it is most likely that adversarial human-driven intentions gain more attention. In this regard, it is anticipated that the present research study can serve as a roadmap for proposing defensive mechanisms to cope with such diverse threats.
Details
Keywords
WE write on the eve of an Annual Meeting of the Library Association. We expect many interesting things from it, for although it is not the first meeting under the new…
Abstract
WE write on the eve of an Annual Meeting of the Library Association. We expect many interesting things from it, for although it is not the first meeting under the new constitution, it is the first in which all the sections will be actively engaged. From a membership of eight hundred in 1927 we are, in 1930, within measurable distance of a membership of three thousand; and, although we have not reached that figure by a few hundreds—and those few will be the most difficult to obtain quickly—this is a really memorable achievement. There are certain necessary results of the Association's expansion. In the former days it was possible for every member, if he desired, to attend all the meetings; today parallel meetings are necessary in order to represent all interests, and members must make a selection amongst the good things offered. Large meetings are not entirely desirable; discussion of any effective sort is impossible in them; and the speakers are usually those who always speak, and who possess more nerve than the rest of us. This does not mean that they are not worth a hearing. Nevertheless, seeing that at least 1,000 will be at Cambridge, small sectional meetings in which no one who has anything to say need be afraid of saying it, are an ideal to which we are forced by the growth of our numbers.
Omar AlHussainan, Ying Guo, Hussain Gulzar Rammal, Ryan W. Tang and Ismail Golgeci
The purpose of this study is to empirically investigate the dark side of business-to-business (B2B) relationships in traditional business practices worldwide that rely on strong…
Abstract
Purpose
The purpose of this study is to empirically investigate the dark side of business-to-business (B2B) relationships in traditional business practices worldwide that rely on strong networks.
Design/methodology/approach
This study applies a questionnaire survey to collect data from buyers in 224 Kuwaiti firms and uses the partial least squares structural equation model for data analysis.
Findings
Drawing on the social exchange theory, we test the relationships between B2B wasta, relationship satisfaction, innovation and efficiency. The findings show that despite the belief that wasta brings long-term benefits when applied in B2B relationships, it negatively impacts the firm’s efficiency.
Originality/value
This study contributes to the existing literature on B2B relationships by identifying important issues related to the multifaceted nature of B2B wasta relationships. The study confirms the importance of relational and innovation benefits over economic consequences based on elements of social exchange theory, which extends our current understanding of the application of SET in B2B wasta relationships.
Details
Keywords
Daniel Trabucchi and Tommaso Buganza
The pervasive spread of digital technologies brought an incredible boost in data availability. Companies are dealing with massive amount of data that wait to be exploited. At the…
Abstract
Purpose
The pervasive spread of digital technologies brought an incredible boost in data availability. Companies are dealing with massive amount of data that wait to be exploited. At the same time, scholars are providing different strategies and methods to help companies capture the value embedded in their data to foster innovation and improve the efficiency of existing processes. In these research studies, data are the by-product of something else, and they are a silent asset that needs to be exploited. What if data might be considered the final goal? The paper aims to discuss these issues.
Design/methodology/approach
The research is based on an exploratory multiple case study analysis, on the basis of three cases used as an illustration for new ideas. In particular, the gathered data are analyzed according to models previously presented in the literature review, building on and expanding them.
Findings
The research proposes a data-driven approach to innovation, offering a peculiar view of the innovation process. The trigger point is the need of data that let begin the entire development process of a complex system. In this perspective, the application that data are a by-product of the entire innovation process and not the primary output is peculiar since the vast majority of the literature consider data as the by-product of the primary product.
Research limitations/implications
Future research is needed to assess the replicability of the model outside the mobile app industry and to measure its performances. Nevertheless, this paper provides insights both for scholars and managers, enlarging the discussion on digital innovation and digital business models.
Practical implications
The results provide a development process to foster innovation relying on the need of data as the trigger point, guiding entrepreneurs and managers in the building process of the entire digital system.
Originality/value
Previous research studies often considered Big Data (BD) in innovation as a way to enlarge the current product offer or to make the innovation process more effective or efficient; this paper changes the perspective by considering BD as the trigger and the enabler of the entire digital innovation process.
Details
Keywords
Fabio Ramazzini Bechara and Samara Bueno Schuch
This study aims to define objectively what are the elements that should be considered in the repositioning of international cooperation, less under its value, which is…
Abstract
Purpose
This study aims to define objectively what are the elements that should be considered in the repositioning of international cooperation, less under its value, which is unquestionable, but more under the optics of the procedure, how can it be operationalized. International cooperation goes beyond the regulatory effort, which, although an important step, is insufficient. It is inserted in an environment in which there is a multiplicity of forces and instances, non-converging and tensioned. At the same time, in the authors’ view, it is not about cooperation between states or between states and international organizations only, it must understand the private sector equally, which has the expressive property of the technologies used.
Design/methodology/approach
The study uses an interdisciplinary approach, and the method of analysis is the typothetical deductive.
Findings
Cybersecurity as a global and complex issue demands cooperation between nations, but also the private sector and civil society engagement. It also demands a good governance in the decision making process, more integrated, accurated and precised.
Originality/value
This study is original, and it represents a special concern and vision from professional and academic fields.
Details
Keywords
Manish Gupta, Priyanko Guchait, Ofra Shoham-Bazel, Naresh Khatri, Vijay Pereira, Shlomo Tarba and Arup Varma
Robin Hofmeester and Daniel R. Eyers
There is now much emphasis in both research and practice on the principles of circular economies. In this paper remanufacturing is examined as a key enabler of circular practices…
Abstract
Purpose
There is now much emphasis in both research and practice on the principles of circular economies. In this paper remanufacturing is examined as a key enabler of circular practices, and the concept of “Product-Agnostic Manufacturing” (PAR) is proposed. This work differentiates PAR from many traditional approaches to remanufacturing by virtue of PAR's treatment of product variety. Most existing approaches to remanufacturing feature low variety and standardisation; this study instead suggests that the exploitation of flexibilities in both operations and supply chains leads to new competitive strategies for firms to exploit.
Design/methodology/approach
This is a conceptual study that builds on a thorough exploration of contemporary remanufacturing literature in the development of the new PAR concept.
Findings
Through a detailed literature review it is shown that there are a range of benefits, challenges, and critical success factors that underpin the remanufacturing concept. Building on this understanding and bridging literature in operations flexibility and supply chain design, a detailed discussion on the nature of PAR is provided, and an agenda for future research developed.
Originality/value
Whilst there has been much literature on remanufacturing, there is a general tendency to treat supply chain and remanufacturing operations quite distinctly in individual articles. Additionally, there has been little consideration of multi-product remanufacturing, and for the limited studies where this is done, the emphasis is typically on problem avoidance. This study aims to provide a detailed insight into the developed PAR concept, showing how the remanufacture of a wide range of product varieties may be achieved through flexible operations and supply chain design.
Details