Search results
1 – 10 of 95Thilo Kahl, Herbert Bousack, Erik S. Schneider and Helmut Schmitz
Early detection of forest fires offers the chance to put the fire out before it gets out of control. The purpose of this paper is to look into nature and to learn how certain…
Abstract
Purpose
Early detection of forest fires offers the chance to put the fire out before it gets out of control. The purpose of this paper is to look into nature and to learn how certain insects detect remote forest fires. A small group of highly specialized insects that have been called pyrophilous is attracted by forest fires and approaches fires sometimes from distances of many kilometers. As a unique feature some of these insects are equipped with infrared (IR) receptors, which in case of two species of jewel beetles (family Buprestidae) are used for fire detection.
Design/methodology/approach
The paper has investigated the IR receptors of the pyrophilous beetles with various morphological techniques including scanning electron microscopy, transmission electron microscopy, neuroanatomy and the paper also investigated the thermo-/mechanical properties of the IR receptors by nanoindentation. Data were used for subsequent modeling of a biomimetic technical sensor. Finally, a macroscopic prototype was built and tested.
Findings
This biological principle was transferred into a new kind of uncooled technical IR receptor. A simple model for this biological IR sensor is a modified Golay sensor in which the gas has been replaced by a liquid. Here, the absorbed IR radiation results in a pressure increase of the liquid and the deflection of a thin membrane. For the evaluation of this model, analytical formulas are presented, which permits the calculation of the pressure increase in the cavity, the deformation of the membrane and the time constant of an artificial leak to compensate ambient temperature changes. Some organic liquids with high thermal expansion coefficients may improve the deflection of the membrane compared to water.
Originality/value
Results so far obtained suggest that it seems promising to take the photomechanic IR receptors of pyrophilous jewel beetles as models for the building of new uncooled IR sensors. The beetle receptors have been shaped by evolution since thousands of years and, therefore, can be considered as highly optimized sources of inspiration for new technical sensors suitable for remote fire detection.
Details
Keywords
Bobbi-Jo Wathen, Patrick D. Cunningham, Paul Singleton, Dejanell C. Mittman, Sophia L. Ángeles, Jessica Fort, Rickya S. F. Freeman and Erik M. Hines
School counselors are committed to serving students' social-emotional, postsecondary, and academic needs while they navigate primary and secondary school (American School…
Abstract
School counselors are committed to serving students' social-emotional, postsecondary, and academic needs while they navigate primary and secondary school (American School Counselor Association, 2019). Much has been said about the ways in which school counselors can impact postsecondary outcomes and social emotional health. It is important that we also address the ways school counselors can impact positive academic outcomes as it is intertwined in postsecondary options and success. For Black males, academic success has traditionally been met with systemic barriers (i.e., school-to-prison pipeline, lower graduation rates, lower incomes, higher unemployment rates, and lower college going rates (National Center for Edcuation Statisitics, 2019a, 2019b, 2020a, 2020b) and low expectations. School counselors are charged to be leaders and change agents for social justice and equity in our schools by the American School Counselor Association (ASCA, 2019) and can impact systemic change. This chapter will explore ways in which school counselors can impact positive academic outcomes for Black males. School counselors as change agents and advocates are positioned to make a real impact for Black male academic success. The authors will also provide some recommendations and best practices for elementary, middle, and high school counselors as they work with students, teachers, and families from an anti-deficit model as outlined by Harper (2012).
Details
Keywords
Katherine Taken Smith, Lawrence Murphy Smith, Marcus Burger and Erik S. Boyle
Cyber terrorism poses a serious technology risk to businesses and the economies they operate in. Cyber terrorism is a digital attack on computers, networks or digital information…
Abstract
Purpose
Cyber terrorism poses a serious technology risk to businesses and the economies they operate in. Cyber terrorism is a digital attack on computers, networks or digital information systems, carried out to coerce people or governments to further the social or political objectives of the attacker. Cyber terrorism is costly in terms of impaired operations and damaged assets. Cyber terrorism harms a firm’s reputation, thereby negatively affecting a firm’s stock market valuation. This poses grave worries to company management, financial analysts, creditors and investors. This study aims to evaluate the effect of cyber terrorism on the market value of publicly traded firms.
Design/methodology/approach
Financial information was obtained on business firms that were featured in news stories as targets of cyber terrorism. The firm’s stock price was recorded for 1, 3 and 7 days before and after the news article. Percentage changes in the firm’s stock price were compared to percentage changes in the Dow Jones Index to ascertain whether the firm’s stock price went up or down matching the market overall.
Findings
Results indicate that stock prices are significantly negatively affected by news of cyber terrorist attacks on companies. In all three time periods after the cyber terrorist attack, there was a significant negative decline in the stock value relative to the Dow Jones Index. Thus, the market valuation of the firm is damaged. As a result, the shareholders and institutions are financially damaged. Furthermore, exposed system vulnerability may lead to loss of business from consumers who have reduced confidence in the firm’s operations.
Practical implications
This paper examines the risks posed by cyber terrorism, including its impact on individual business firms, which in turn affect entire national economic systems. This makes clear the high value of cybersecurity in safeguarding computer systems. Taking steps to avoid being a victim of cyber terrorism is an important aspect of cybersecurity. Preventative steps are normally far less costly than rebuilding an information system after a cyber terrorist attack.
Originality/value
This study is original in examining the effect of cyber terrorism on the stock value of a company.
Details
Keywords
Erik Beuck, Nourah Shuaibi and Wonjae Hwang
By examining the link between the two types of FDI and intrastate conflict from 1990 to 2015 in 138 countries, this paper intends to test the peace-through-FDI thesis.
Abstract
Purpose
By examining the link between the two types of FDI and intrastate conflict from 1990 to 2015 in 138 countries, this paper intends to test the peace-through-FDI thesis.
Design/methodology/approach
To empirically test the hypotheses, this study examines county-year observations from 1990 to 2015 for 138 countries. An instrumental variable method is utilized to this end.
Findings
This paper shows that, while greenfield FDI generates pacifying effects on intrastate conflict, M&A investment is likely to promote the onset of intrastate conflict.
Originality/value
Despite the extensive literature on FDI and the onset of intrastate conflict, many have approached FDI as a singular phenomenon, and have not broken it down into its constituent parts of greenfield and brownfield investment types. Theorizing that this practice had oversimplified and blurred the relationship of FDI on intrastate conflict onset, the authors pursued the collection of novel data in order to more completely distinguish between the two types of FDI. With this novel approach dividing FDI into its component parts, the authors break open the black box of FDI to empirically find out the extent of its diverse influence on the onset of intrastate conflict.
Details
Keywords
Erik Champion and Susannah Emery
Engaging with digital heritage requires understanding not only to comprehend what is simulated but also the reasons leading to its creation and curation, and how to ensure both…
Abstract
Engaging with digital heritage requires understanding not only to comprehend what is simulated but also the reasons leading to its creation and curation, and how to ensure both the digital media and the significance of the cultural heritage it portrays are passed on effectively, meaningfully, and appropriately. The United Nations Educational, Scientific, and Cultural Organization defines ‘digital heritage’ to comprise of computer-based materials of enduring value some of which require active preservation strategies to maintain them for years to come.
With the proliferation of digital technologies and digital media, computer games have increasingly been seen as not only depicters of cultural heritage and platforms for virtual heritage scholarship and dissemination but also as digital cultural artefacts worthy of preservation. In this chapter, we examine how games (both digital and non-digital) can communicate cultural heritage in a galleries, libraries, archives, and museums [GLAM] setting. We also consider how they can and have been used to explore, communicate, and preserve heritage and, in particular, Indigenous heritage. Despite their apparently transient and ephemeral nature, especially compared to conventional media such as books, we argue computer games can be incorporated into active preservation approaches to digital heritage. Indeed, they may be of value to cultural heritage that needs to be not only viewed but also viscerally experienced or otherwise performed.
Details
Keywords
Erik Kloppenborg Madsen and Kurt Pedersen
The purpose of this article is to show how a particular marketing paradigm developed in Denmark from the 1920s through to the 1960s. It peaked in the mid‐1950s and faded out with…
Abstract
Purpose
The purpose of this article is to show how a particular marketing paradigm developed in Denmark from the 1920s through to the 1960s. It peaked in the mid‐1950s and faded out with one major publication in the early 1970s. This article aims to provide a relatively detailed study of the initial phases of the school and its key ideas.
Design/methodology/approach
The study is based on primary sources, i.e. the writings of the scholars who shaped and developed the school. A significant number of the sources are available in Danish only.
Findings
While the study of marketing in America developed from the inductive, descriptive approach of the German Historical School, an essential precondition for the Copenhagen approach was the second wave of microeconomic theory of the 1930s. The article argues that it was a marketing management school, and that it offered early contributions to the development of marketing theory.
Originality/value
Relatively little has been written about Danish and Scandinavian history of marketing thought. The authors believe that a detailed review of the Copenhagen School of Marketing may be of some interest to marketing historians around the world.
Details
Keywords
The purpose of this paper is to record the author’s personal reflections on his career as a marketing scholar.
Abstract
Purpose
The purpose of this paper is to record the author’s personal reflections on his career as a marketing scholar.
Design/methodology/approach
Personal reflections in an autobiographical approach.
Findings
The author’s career as student, teacher and scholar is described in some detail.
Originality/value
The paper records events and memories that might otherwise be forgotten. No other such account has been published of Christian Grönroos’s career.
Details
Keywords
Elmar Holschbach and Erik Hofmann
This paper aims to investigate how buying companies manage the quality for their externally sourced business services. It explores how quality management for business services…
Abstract
Purpose
This paper aims to investigate how buying companies manage the quality for their externally sourced business services. It explores how quality management for business services influences the performance of the buying company and what the major determinants of quality management are. The paper presents case evidence on which a conceptual model with preliminary propositions is built upon.
Design/methodology/approach
The paper uses case study evidence from eight manufacturing and eight service companies. Drawing on the findings of these case studies, a conceptual model with propositions is presented.
Findings
The paper suggests that buying companies do not yet use quality management for externally sourced business services to its full potential. However, buying companies using quality management practices for business services report positive effects on service quality and satisfaction of internal or external customers. The major determinants affecting the intensity of quality management are the usage of the service by the buying company, the risk associated with quality failures, the degree of standardization, and volume of the purchased service.
Research limitations/implications
The research is based on information from 16 companies located in Germany and the conducted study is exploratory in nature. The collection of statistical data will be subject to future research as suggested in this paper.
Practical implications
The insights obtained from this paper can assist purchasers in their decision on how to design quality management practices. By understanding, what determines the quality management practices of buying companies, service providers may better adjust their service offerings to customers' requirements.
Originality/value
Quality management for business services in professional procurement has not attracted much academic attention so far, as literature on quality management has mainly adopted the perspective of a goods or service provider. Literature on the purchasing of services concentrates on the differences between the purchasing of goods and services and literature on service quality focuses on consumer services. This paper fills this gap conceptually with a multiple case study and offers guidance for further research.
Details
Keywords
Juri Matinheikki, Katri Kauppi, Alistair Brandon–Jones and Erik M. van Raaij
Contemporary supply chain relationships inherently rely on delegation of work between organizations and, thus, are subject to agency problems for which a wide range of governance…
Abstract
Purpose
Contemporary supply chain relationships inherently rely on delegation of work between organizations and, thus, are subject to agency problems for which a wide range of governance mechanisms exist. This review of agency theory (AT), across four distinct fields, explains the connection between governance mechanisms and supply chain relationship types.
Design/methodology/approach
The study uses a systematic literature review (SLR) of articles using AT in a supply chain context from the operations and supply chain management, general management, marketing, and economics fields.
Findings
The authors categorize the governance mechanisms identified to create a typology of agency relationships in supply chains.
Research limitations/implications
The developed typology provides parsimonious theory on different forms of supply chain agency relationships and takes a step towards a “supply chain-oriented agency theory” explaining and predicting relationship types and governance in supply chains. Furthermore, a future research agenda calls for more accurate measuring of agency costs, to examine residual gains alongside residual losses, to take a dual-sided perspective of agency relations and to adopt AT to examine more complex supply networks.
Practical implications
The review provides a menu of governance mechanisms and describes situations under which these mechanisms could be deployed to guide managers when developing their supply chain relationships.
Originality/value
The first review to combine and elaborate views from four major disciplines using AT as a lens to supply chain relationships. Expanding the traditional set of governance mechanisms provides academics and practitioners with a bigger “menu” of options to consider.
Details
Keywords
Evangelia Demerouti, Erik van Eeuwijk, Margriet Snelder and Ulrike Wild
This study seeks to examine the effects of a “personal effectiveness” training on both assertiveness and Psychological Capital (PsyCap) that were monitored before and after the…
Abstract
Purpose
This study seeks to examine the effects of a “personal effectiveness” training on both assertiveness and Psychological Capital (PsyCap) that were monitored before and after the training.
Design/methodology/approach
In addition to self‐ratings, other‐ratings were assembled to explore two ways in which they can contribute to the monitoring of intervention effects. To verify self‐reported results, and to predict participants' performance through the use of self‐other agreement.
Findings
Overall, rater and ratee scores showed a similar increase on assertiveness and most components of PsyCap. Self‐other agreement measures showed an increase in agreement for assertiveness and PsyCap after the training. Lastly, the type of relationship between rater and ratee appeared to have significant influence on the consistency between raters, such that agreement was higher for cohabiting partners than colleagues, supervisors or friends.
Originality/value
This study has created a better understanding of the role that the self‐other agreement and PsyCap can play in monitoring intervention effects.
Details